Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-44748

Publication date:
24/11/2022
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server&amp;#39;s file system. This vulnerability is also known as &amp;#39;Zip-Slip&amp;#39;.<br /> <br /> <br /> <br /> <br /> <br /> An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server.<br /> <br /> <br /> This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server&amp;#39;s file system, though.<br /> <br /> Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor&amp;#39;s operating system user.<br /> <br /> There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-45873

Publication date:
23/11/2022
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-45872

Publication date:
23/11/2022
iTerm2 before 3.4.18 mishandles a DECRQSS response.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-44117

Publication date:
23/11/2022
Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-45280

Publication date:
23/11/2022
A cross-site scripting (XSS) vulnerability in the Url parameter in /login.php of EyouCMS v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-45278

Publication date:
23/11/2022
Jizhicms v2.3.3 was discovered to contain a SQL injection vulnerability via the /index.php/admins/Fields/get_fields.html component.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-44120

Publication date:
23/11/2022
dedecmdv6 6.1.9 is vulnerable to SQL Injection. via sys_sql_query.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-44118

Publication date:
23/11/2022
dedecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2022-45868

Publication date:
23/11/2022
The web-based admin console in H2 Database Engine before 2.2.220 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." Nonetheless, the issue was fixed in 2.2.220.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-44789

Publication date:
23/11/2022
A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-45276

Publication date:
23/11/2022
An issue in the /index/user/user_edit.html component of YJCMS v1.0.9 allows unauthenticated attackers to obtain the Administrator account password.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-43196

Publication date:
23/11/2022
dedecmdv6 v6.1.9 is vulnerable to Arbitrary file deletion via file_manage_control.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025