Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-41949

Publication date:
08/12/2022
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-23469

Publication date:
08/12/2022
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-33186

Publication date:
08/12/2022
A vulnerability in Brocade Fabric OS software v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j, and earlier versions could allow a remote unauthenticated attacker to execute on a Brocade Fabric OS switch commands capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch IP address.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-46158

Publication date:
08/12/2022
PrestaShop is an open-source e-commerce solution. Versions prior to 1.7.8.8 did not properly restrict host filesystem access for users. Users may have been able to view the contents of the upload directory without appropriate permissions. This issue has been addressed and users are advised to upgrade to version 1.7.8.8. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2022-41717

Publication date:
08/12/2022
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2024

CVE-2022-44938

Publication date:
08/12/2022
Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-4366

Publication date:
08/12/2022
Missing Authorization in GitHub repository lirantal/daloradius prior to master branch.
Severity CVSS v4.0: Pending analysis
Last modification:
06/07/2023

CVE-2022-46831

Publication date:
08/12/2022
In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the "Default Credential Provider Chain" allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system administrators.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-46830

Publication date:
08/12/2022
In JetBrains TeamCity between 2022.10 and 2022.10.1 a custom STS endpoint allowed internal port scanning.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-46829

Publication date:
08/12/2022
In JetBrains JetBrains Gateway before 2022.3 a client could connect without a valid token if the host consented.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-46828

Publication date:
08/12/2022
In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022

CVE-2022-46827

Publication date:
08/12/2022
In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2022