Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1684

Publication date:
08/06/2022
The Cube Slider WordPress plugin through 1.2 does not sanitise and escape the idslider parameter before using it in various SQL queries, leading to SQL Injections exploitable by high privileged users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-1685

Publication date:
08/06/2022
The Five Minute Webshop WordPress plugin through 1.3.2 does not properly validate and sanitise the orderby parameter before using it in a SQL statement via the Manage Products admin page, leading to an SQL Injection
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-1686

Publication date:
08/06/2022
The Five Minute Webshop WordPress plugin through 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-1687

Publication date:
08/06/2022
The Logo Slider WordPress plugin through 1.4.8 does not sanitise and escape the lsp_slider_id parameter before using it in a SQL statement via the Manage Slider Images admin page, leading to an SQL Injection
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-1394

Publication date:
08/06/2022
The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-1005

Publication date:
08/06/2022
The WP Statistics WordPress plugin before 13.2.2 does not sanitise the REQUEST_URI parameter before outputting it back in the rendered page, leading to Cross-Site Scripting (XSS) in web browsers which do not encode characters
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-0779

Publication date:
08/06/2022
The User Meta WordPress plugin before 2.4.4 does not validate the filepath parameter of its um_show_uploaded_file AJAX action, which could allow low privileged users such as subscriber to enumerate the local files on the web server via path traversal payloads
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2022

CVE-2022-1421

Publication date:
08/06/2022
The Discy WordPress theme before 5.2 lacks CSRF checks in some AJAX actions, allowing an attacker to make a logged in admin change arbitrary 's settings including payment methods via a CSRF attack
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022

CVE-2022-1422

Publication date:
08/06/2022
The Discy WordPress theme before 5.2 does not check for CSRF tokens in the AJAX action discy_reset_options, allowing an attacker to trick an admin into resetting the site settings back to defaults.
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022

CVE-2022-1241

Publication date:
08/06/2022
The Ask me WordPress theme before 6.8.2 does not properly sanitise and escape several of the fields in the Edit Profile page, leading to Reflected Cross-Site Scripting issues
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022

CVE-2022-1424

Publication date:
08/06/2022
The Ask me WordPress theme before 6.8.2 does not perform CSRF checks for any of its AJAX actions, allowing an attacker to trick logged in users to perform various actions on their behalf on the site.
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022

CVE-2022-1597

Publication date:
08/06/2022
The WPQA Builder WordPress plugin before 5.4, used as a companion for the Discy and Himer , does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022