Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24190

Publication date:
28/11/2022
The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can send a request to bind their account to any users picture frame, then send a POST request to accept their own bind request, without the end-users approval or interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2022-38753

Publication date:
28/11/2022
This update resolves a multi-factor authentication bypass attack
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-46147

Publication date:
28/11/2022
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to drag items to zones on a target image. Versions prior to 3.0.0 are vulnerable to cross-site scripting in multiple XBlock Fields. Any platform that has deployed the XBlock may be impacted. Version 3.0.0 contains a patch for this issue. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022

CVE-2022-45921

Publication date:
28/11/2022
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2022-44937

Publication date:
28/11/2022
Bosscms v2.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Add function under the Administrator List module.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-41965

Publication date:
28/11/2022
Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022

CVE-2022-45442

Publication date:
28/11/2022
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2022-38140

Publication date:
28/11/2022
Auth. (contributor+) Arbitrary File Upload in SEO Plugin by Squirrly SEO plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-34654

Publication date:
28/11/2022
Cross-Site Request Forgery (CSRF) in Virgial Berveling's Manage Notification E-mails plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-4104

Publication date:
28/11/2022
A loop with an unreachable exit condition can be triggered by passing a crafted JPEG file to the Lepton image compression tool, resulting in a denial-of-service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022

CVE-2022-4169

Publication date:
28/11/2022
The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_wp_loaded() function. This makes it possible for unauthenticated attackers to update plugin and theme translation settings and to import translation strings.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-41732

Publication date:
28/11/2022
<br /> IBM Maximo Mobile 8.7 and 8.8 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 237407.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023