Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-0867

Publication date:
16/05/2022
The Pricing Table WordPress plugin before 3.6.1 fails to properly sanitize and escape user supplied POST data before it is being interpolated in an SQL statement and then executed via an AJAX action available to unauthenticated users
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-0574

Publication date:
16/05/2022
Improper Access Control in GitHub repository publify/publify prior to 9.2.8.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-1051

Publication date:
16/05/2022
The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin for the Discy and Himer , does not sanitise and escape the city, phone or profile credentials fields when outputting it in the profile page, allowing any authenticated user to perform Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-1062

Publication date:
16/05/2022
The th23 Social WordPress plugin through 1.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2021-25119

Publication date:
16/05/2022
The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-0573

Publication date:
16/05/2022
JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-0578

Publication date:
16/05/2022
Code Injection in GitHub repository publify/publify prior to 9.2.8.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-29622

Publication date:
16/05/2022
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-29623

Publication date:
16/05/2022
An arbitrary file upload vulnerability in the file upload module of Express Connect-Multiparty 2.2.0 allows attackers to execute arbitrary code via a crafted PDF file. NOTE: the Supplier has not verified this vulnerability report.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2022-30013

Publication date:
16/05/2022
A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-30776

Publication date:
16/05/2022
atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-30777

Publication date:
16/05/2022
Parallels H-Sphere 3.6.1713 allows XSS via the index_en.php from parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023