Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-40315

Publication date:
30/09/2022
A limited SQL injection risk was identified in the "browse list of users" site administration page.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-40277

Publication date:
30/09/2022
Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-40274

Publication date:
30/09/2022
Gridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-40316

Publication date:
30/09/2022
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-36961

Publication date:
30/09/2022
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2022-36965

Publication date:
30/09/2022
Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0).
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-32540

Publication date:
30/09/2022
Information Disclosure in Operator Client application in BVMS 10.1.1, 11.0 and 11.1.0 and VIDEOJET Decoder VJD-7513 versions 10.23 and 10.30 allows man-in-the-middle attacker to compromise confidential video stream. This is only applicable for UDP encryption when target system contains cameras with platform CPP13 or CPP14 and firmware version 8.x.
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2022

CVE-2022-21826

Publication date:
30/09/2022
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2022-28851

Publication date:
30/09/2022
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2022

CVE-2022-1959

Publication date:
30/09/2022
AppLock version 7.9.29 allows an attacker with physical access to the device to bypass biometric authentication. This is possible because the application did not correctly implement fingerprint validations.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2021-36839

Publication date:
30/09/2022
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Social Media Follow Buttons Bar plugin
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2022

CVE-2021-36855

Publication date:
30/09/2022
Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in Booking Ultra Pro plugin
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2022