Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-24688

Publication date:
28/02/2022
The Orange Form WordPress plugin through 1.0.1 does not have any authorisation and CSRF checks in all of its AJAX calls, for example the or_delete_filed one which is available to both unauthenticated and authenticated users could allow attackers to delete arbitrary posts.The AJAX calls performing actions on posts also do not ensure that the post belong to them (or that they are allowed to perform such action on it)
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2020-36510

Publication date:
28/02/2022
The 15Zine WordPress theme before 3.3.0 does not sanitise and escape the cbi parameter before outputing it back in the response via the cb_s_a AJAX action, leading to a Reflected Cross-Site Scripting
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2021-24730

Publication date:
28/02/2022
The Logo Showcase with Slick Slider WordPress plugin before 1.2.5 does not have CSRF and authorisation checks in the lswss_save_attachment_data AJAX action, allowing any authenticated users, such as Subscriber, to change title, description, alt text, and URL of arbitrary uploaded media.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-26159

Publication date:
28/02/2022
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion//en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-43945

Publication date:
28/02/2022
Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint. The affected versions are before version 8.20.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2022

CVE-2022-0772

Publication date:
27/02/2022
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2021-21708

Publication date:
27/02/2022
In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2022

CVE-2021-3967

Publication date:
26/02/2022
Improper Access Control in GitHub repository zulip/zulip prior to 4.10.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2022-22908

Publication date:
26/02/2022
SangforCSClient.exe in Sangfor VDI Client 5.4.2.1006 allows attackers, when they are able to read process memory, to discover the contents of the Username and Password fields.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2022-26149

Publication date:
26/02/2022
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2023

CVE-2022-26146

Publication date:
26/02/2022
Tricentis qTest before 10.4 allows stored XSS by an authenticated attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2020-27958

Publication date:
26/02/2022
The Job Composer app in Ohio Supercomputer Center Open OnDemand before 1.7.19 and 1.8.x before 1.8.18 allows remote authenticated users to provide crafted input in a job template.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022