Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-36927

Publication date:
09/01/2023
Zoom Rooms for macOS clients before version 5.11.3 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2022-36926

Publication date:
09/01/2023
Zoom Rooms for macOS clients before version 5.11.3 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2022-36925

Publication date:
09/01/2023
Zoom Rooms for macOS clients before version 5.11.4 contain an insecure key generation mechanism. The encryption key used for IPC between the Zoom Rooms daemon service and the Zoom Rooms client was generated using parameters that could be obtained by a local low-privileged application. That key can then be used to interact with the daemon service to execute privileged functions and cause a local denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2022-47790

Publication date:
09/01/2023
Sourcecodester Dynamic Transaction Queuing System v1.0 is vulnerable to SQL Injection via /queuing/index.php?page=display&id=.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2022-4884

Publication date:
09/01/2023
Path-Traversal in MKP storing in Tribe29 Checkmk
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2024

CVE-2022-46258

Publication date:
09/01/2023
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2023-22477

Publication date:
09/01/2023
Mercurius is a GraphQL adapter for Fastify. Any users of Mercurius until version 10.5.0 are subjected to a denial of service attack by sending a malformed packet over WebSocket to `/graphql`. This issue was patched in #940. As a workaround, users can disable subscriptions.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-22473

Publication date:
09/01/2023
Talk-Android enables users to have video &amp; audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user&amp;#39;s Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target&amp;#39;s device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-22472

Publication date:
09/01/2023
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23509

Publication date:
09/01/2023
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local S3 bucket is not encrypted. This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster&amp;#39;s resources. There are no known workaround(s) for this vulnerability. This vulnerability has been fixed by commits ce2bbff and babd915. Users should upgrade to Weave GitOps version &gt;= v0.12.0 released on 08/12/2022.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23508

Publication date:
09/01/2023
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster&amp;#39;s resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version &gt;= v0.12.0 released on 08/12/2022.<br /> <br /> ### Workarounds<br /> There is no workaround for this vulnerability.<br /> <br /> ### References<br /> Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks.<br /> <br /> ### For more information<br /> If you have any questions or comments about this advisory:<br /> <br /> - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops)<br /> - Email us at [support@weave.works](mailto:support@weave.works)<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-4311

Publication date:
09/01/2023
A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The patch is identified as 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024