Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24188

Publication date:
28/11/2022
The /device/signin end-point for the Ourphoto App version 1.4.1 discloses clear-text password information for functionality within the picture frame devices. The deviceVideoCallPassword and mqttPassword are returned in clear-text. The lack of sessions management and presence of insecure direct object references allows to return password information for other end-users devices. Many of the picture frame devices offer video calling, and it is likely this information can be used to abuse that functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2022-24187

Publication date:
28/11/2022
The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2022-24190

Publication date:
28/11/2022
The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can send a request to bind their account to any users picture frame, then send a POST request to accept their own bind request, without the end-users approval or interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2022-38753

Publication date:
28/11/2022
This update resolves a multi-factor authentication bypass attack
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-46147

Publication date:
28/11/2022
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to drag items to zones on a target image. Versions prior to 3.0.0 are vulnerable to cross-site scripting in multiple XBlock Fields. Any platform that has deployed the XBlock may be impacted. Version 3.0.0 contains a patch for this issue. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022

CVE-2022-45921

Publication date:
28/11/2022
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2022-44937

Publication date:
28/11/2022
Bosscms v2.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Add function under the Administrator List module.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-41965

Publication date:
28/11/2022
Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022

CVE-2022-45442

Publication date:
28/11/2022
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2022-38140

Publication date:
28/11/2022
Auth. (contributor+) Arbitrary File Upload in SEO Plugin by Squirrly SEO plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-34654

Publication date:
28/11/2022
Cross-Site Request Forgery (CSRF) in Virgial Berveling's Manage Notification E-mails plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-4104

Publication date:
28/11/2022
A loop with an unreachable exit condition can be triggered by passing a crafted JPEG file to the Lepton image compression tool, resulting in a denial-of-service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2022