Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-31615

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2023

CVE-2022-31610

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2022

CVE-2022-31612

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to a system crash or a leak of internal kernel information.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2022

CVE-2022-31608

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2023

CVE-2022-31607

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2023

CVE-2022-31606

Publication date:
19/11/2022
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2022

CVE-2022-30256

Publication date:
19/11/2022
An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2022-45369

Publication date:
18/11/2022
Auth. (subscriber+) Broken Access Control vulnerability in Plugin for Google Reviews plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2022-45082

Publication date:
18/11/2022
Multiple Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerabilities in Accordions plugin
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2022

CVE-2022-45132

Publication date:
18/11/2022
In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2022-44740

Publication date:
18/11/2022
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Creative Mail plugin
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2022

CVE-2022-45073

Publication date:
18/11/2022
Cross-Site Request Forgery (CSRF) vulnerability in REST API Authentication plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2022