Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-33965

Publication date:
25/07/2022
Multiple Unauthenticated SQL Injection (SQLi) vulnerabilities in Osamaesh WP Visitor Statistics plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2022-34961

Publication date:
25/07/2022
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Users Timeline module.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2021-40335

Publication date:
25/07/2022
A vulnerability exists in the HTTP web interface where the web interface does not sufficiently verify if a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. This cause a Cross Site Request Forgery (CSRF), which if exploited could lead an attacker to gain unauthorized access to the web application and perform an unwanted operation on it without the knowledge of the legitimate user. An attacker, who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., link is sent per E-Mail, could perform harmful command on MSM through its web server interface. This issue affects: Hitachi Energy MSM V2.2 and prior versions.
Severity CVSS v4.0: Pending analysis
Last modification:
19/04/2023

CVE-2022-26305

Publication date:
25/07/2022
An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2023

CVE-2022-34963

Publication date:
25/07/2022
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the News Feed module.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2022-34964

Publication date:
25/07/2022
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the SitePages module.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2020-7677

Publication date:
25/07/2022
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-23451

Publication date:
25/07/2022
The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2020-7678

Publication date:
25/07/2022
This affects all versions of package node-import. The "params" argument of module function can be controlled by users without any sanitization.b. This is then provided to the “eval” function located in line 79 in the index file "index.js".
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2021-23373

Publication date:
25/07/2022
All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2021-23397

Publication date:
25/07/2022
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2022-2523

Publication date:
25/07/2022
Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2022