Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-28353

Publication date:
16/04/2023
In the External Redirect Warning Plugin 1.3 for MyBB, the redirect URL (aka external.php?url=) is vulnerable to XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-30076

Publication date:
16/04/2023
ENTAB ERP 1.0 allows attackers to discover users' full names via a brute force attack with a series of student usernames such as s10000 through s20000. There is no rate limiting.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-34125

Publication date:
16/04/2023
front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-34126

Publication date:
16/04/2023
The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-34127

Publication date:
16/04/2023
The Managentities plugin before 4.0.2 for GLPI allows reading local files via directory traversal in the inc/cri.class.php file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-34128

Publication date:
16/04/2023
The Cartography (aka positions) plugin before 6.0.1 for GLPI allows remote code execution via PHP code in the POST data to front/upload.php.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-43128

Publication date:
16/04/2023
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2022-42245. Reason: This record is a duplicate of CVE-2022-42245. Notes: All CVE users should reference CVE-2022-42245 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-38840

Publication date:
16/04/2023
cgi-bin/xmlstatus.cgi in Güralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-38841

Publication date:
16/04/2023
Linksys AX3200 1.1.00 is vulnerable to OS command injection by authenticated users via shell metacharacters to the diagnostics traceroute page.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-40946

Publication date:
16/04/2023
On D-Link DIR-819 Firmware Version 1.06 Hardware Version A1 devices, it is possible to trigger a Denial of Service via the sys_token parameter in a cgi-bin/webproc?getpage=html/index.html request.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-37306

Publication date:
16/04/2023
OX App Suite before 7.10.6-rev30 allows XSS via an upsell trigger.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2022-37255

Publication date:
16/04/2023
TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025