Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-23265

Publication date:
16/05/2022
A logged-in and authenticated user with a Reviewer Role may lock a content item.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2022

CVE-2021-33318

Publication date:
16/05/2022
An Input Validation Vulnerability exists in Joel Christner .NET C# packages WatsonWebserver, IpMatcher 1.0.4.1 and below (IpMatcher) and 4.1.3 and below (WatsonWebserver) due to insufficient validation of input IP addresses and netmasks against the internal Matcher list of IP addresses and subnets.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-1557

Publication date:
16/05/2022
The ULeak Security & Monitoring WordPress plugin through 1.2.3 does not have authorisation and CSRF checks when updating its settings, and is also lacking sanitisation as well as escaping in some of them, which could allow any authenticated users such as subscriber to perform Stored Cross-Site Scripting attacks against admins viewing the settings
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-1559

Publication date:
16/05/2022
The Clipr WordPress plugin through 1.2.3 does not sanitise and escape its API Key settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-1726

Publication date:
16/05/2022
Bootstrap Tables XSS vulnerability with Table Export plug-in when exportOptions: htmlContent is true in GitHub repository wenzhixin/bootstrap-table prior to 1.20.2. Disclosing session cookies, disclosing secure session data, exfiltrating data to third-parties.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-1728

Publication date:
16/05/2022
Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-30523

Publication date:
16/05/2022
Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-1713

Publication date:
16/05/2022
SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2023

CVE-2022-1721

Publication date:
16/05/2022
Path Traversal in WellKnownServlet in GitHub repository jgraph/drawio prior to 18.0.5. Read local files of the web application.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2023

CVE-2022-1722

Publication date:
16/05/2022
SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2023

CVE-2022-1560

Publication date:
16/05/2022
The Amministrazione Aperta WordPress plugin before 3.8 does not validate the open parameter before using it in an include statement, leading to a Local File Inclusion issue. The original advisory mentions that unauthenticated users can exploit this, however the affected file generates a fatal error when accessed directly and the affected code is not reached. The issue can be exploited via the dashboard when logged in as an admin, or by making a logged in admin open a malicious link
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2022

CVE-2022-1553

Publication date:
16/05/2022
Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022