Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-40443

Publication date:
22/09/2022
An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-40444

Publication date:
22/09/2022
ZZCMS 2022 was discovered to contain a full path disclosure vulnerability via the page /admin/index.PHP? _server.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-40446

Publication date:
22/09/2022
ZZCMS 2022 was discovered to contain a SQL injection vulnerability via the component /admin/sendmailto.php?tomail=&groupid=.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-3256

Publication date:
22/09/2022
Use After Free in GitHub repository vim/vim prior to 9.0.0530.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3267

Publication date:
22/09/2022
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2022

CVE-2022-3268

Publication date:
22/09/2022
Weak Password Requirements in GitHub repository ikus060/minarca prior to 4.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2022

CVE-2022-2266

Publication date:
22/09/2022
University Library Automation System developed by Yordam Bilgi Teknolojileri before version 19.2 has an unauthenticated Reflected XSS vulnerability. This has been fixed in the version 19.2
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2022-40705

Publication date:
22/09/2022
An Improper Restriction of XML External Entity Reference vulnerability in RPCRouterServlet of Apache SOAP allows an attacker to read arbitrary files over HTTP. This issue affects Apache SOAP version 2.2 and later versions. It is unknown whether previous versions are also affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-40186

Publication date:
22/09/2022
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-28981

Publication date:
22/09/2022
Path traversal vulnerability in the Hypermedia REST APIs module in Liferay Portal 7.4.0 through 7.4.2 allows remote attackers to access files outside of com.liferay.headless.discovery.web/META-INF/resources via the `parameter` parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-28980

Publication date:
22/09/2022
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal v7.4.3.4 and Liferay DXP v7.4 GA allows attackers to execute arbitrary web scripts or HTML via parameters with the filter_ prefix.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-38512

Publication date:
22/09/2022
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36, and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation, allowing attackers to download a web content page's XLIFF translation file via crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025