Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-3362

Publication date:
14/11/2022
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2022

CVE-2022-3238

Publication date:
14/11/2022
A double-free flaw was found in the Linux kernel’s NTFS3 subsystem in how a user triggers remount and umount simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-39385

Publication date:
14/11/2022
Discourse is the an open source discussion platform. In some rare cases users redeeming an invitation can be added as a participant to several private message topics that they should not be added to. They are not notified of this, it happens transparently in the background. This issue has been resolved in commit `a414520742` and will be included in future releases. Users are advised to upgrade. Users are also advised to set `SiteSetting.max_invites_per_day` to 0 until the patch is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2022

CVE-2022-38167

Publication date:
14/11/2022
The Nintex Workflow plugin 5.2.2.30 for SharePoint allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-28764

Publication date:
14/11/2022
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2022

CVE-2022-37109

Publication date:
14/11/2022
patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-27896

Publication date:
14/11/2022
Information Exposure Through Log Files vulnerability discovered in Foundry Code-Workbooks where the endpoint backing that console was generating service log records of any Python code being run. These service logs included the Foundry token that represents the Code-Workbooks Python console. Upgrade to Code-Workbooks version 4.461.0. This issue affects Palantir Foundry Code-Workbooks version 4.144 to version 4.460.0 and is resolved in 4.461.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2022

CVE-2022-44390

Publication date:
14/11/2022
A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2022

CVE-2022-44389

Publication date:
14/11/2022
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Edit Admin Profile module. This vulnerability allows attackers to arbitrarily change Administrator account information.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2022-44387

Publication date:
14/11/2022
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Basic Information component under the Edit Member module.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2022-43323

Publication date:
14/11/2022
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Top Up Balance component under the Edit Member module.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2022-34320

Publication date:
14/11/2022
<br /> IBM CICS TX 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229464.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023