Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22361

Publication date:
31/05/2022
IBM Business Automation Workflow traditional 21.0.1 through 21.0.3, 20.0.0.1 through 20.0.0.2, 19.0.0.1 through 19.0.0.3, 18.0.0.0 through 18.0.0.1, IBM Business Automation Workflow containers V21.0.1 - V21.0.3 20.0.0.1 through 20.0.0.2, IBM Business Process Manager 8.6.0.0 through 8.6.0.201803, and 8.5.0.0 through 8.5.0.201706 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2022

CVE-2022-23082

Publication date:
31/05/2022
In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2022

CVE-2022-30973

Publication date:
31/05/2022
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2022-1942

Publication date:
31/05/2022
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-3555

Publication date:
31/05/2022
A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution. This issue affects: Eufy Indoor 2K Indoor Camera 2.0.9.3 version and prior versions.
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2022

CVE-2022-1926

Publication date:
31/05/2022
Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1934

Publication date:
31/05/2022
Use After Free in GitHub repository mruby/mruby prior to 3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1931

Publication date:
31/05/2022
Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1582

Publication date:
30/05/2022
The External Links in New Window / New Tab WordPress plugin before 1.43 does not properly escape URLs it concatenates to onclick event handlers, which makes Stored Cross-Site Scripting attacks possible.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1568

Publication date:
30/05/2022
The Team Members WordPress plugin before 5.1.1 does not escape some of its Team settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1644

Publication date:
30/05/2022
The Call&Book Mobile Bar WordPress plugin through 1.2.2 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1645

Publication date:
30/05/2022
The Amazon Link WordPress plugin through 3.2.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022