Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-27934

Publication date:
17/07/2022
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-27935

Publication date:
17/07/2022
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-27936

Publication date:
17/07/2022
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-26654

Publication date:
17/07/2022
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-27937

Publication date:
17/07/2022
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2022

CVE-2022-25357

Publication date:
17/07/2022
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-30622

Publication date:
17/07/2022
Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2022

CVE-2022-31260

Publication date:
17/07/2022
In Montala ResourceSpace through 9.8 before r19636, csv_export_results_metadata.php allows attackers to export collection metadata via a non-NULL k value.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2022-30550

Publication date:
17/07/2022
An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.
Severity CVSS v4.0: Pending analysis
Last modification:
23/05/2025

CVE-2022-35861

Publication date:
17/07/2022
pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023

CVE-2022-32320

Publication date:
17/07/2022
A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2022-2173

Publication date:
17/07/2022
The Advanced Database Cleaner WordPress plugin before 3.1.1 does not escape numerous generated URLs before outputting them back in href attributes of admin dashboard pages, leading to Reflected Cross-Site Scripting
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2022