Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-45025

Publication date:
07/12/2022
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45009

Publication date:
07/12/2022
Online Leave Management System v1.0 was discovered to contain an arbitrary file upload vulnerability at /leave_system/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45008

Publication date:
07/12/2022
Online Leave Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /leave_system/admin/?page=maintenance/department. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted payload injected into the Name field under the Create New module.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-44942

Publication date:
07/12/2022
Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the uploadFile function.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-44153

Publication date:
07/12/2022
Rapid Software LLC Rapid SCADA 5.8.4 is vulnerable to Cross Site Scripting (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-42329

Publication date:
07/12/2022
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-42328

Publication date:
07/12/2022
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45917

Publication date:
07/12/2022
ILIAS before 7.16 has an Open Redirect.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45916

Publication date:
07/12/2022
ILIAS before 7.16 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45915

Publication date:
07/12/2022
ILIAS before 7.16 allows OS Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-3643

Publication date:
07/12/2022
Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2022-45918

Publication date:
07/12/2022
ILIAS before 7.16 allows External Control of File Name or Path.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024