Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-28134

Publication date:
29/03/2022
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2023

CVE-2022-28147

Publication date:
29/03/2022
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2022-28137

Publication date:
29/03/2022
A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2023

CVE-2022-28135

Publication date:
29/03/2022
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023

CVE-2022-23903

Publication date:
29/03/2022
A Cross Site Scripting (XSS) vulnerability exists in pearadmin pear-admin-think
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2022

CVE-2022-23901

Publication date:
29/03/2022
A stack overflow re2c 2.2 exists due to infinite recursion issues in src/dfa/dead_rules.cc.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2022

CVE-2022-23059

Publication date:
29/03/2022
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2022

CVE-2022-1032

Publication date:
29/03/2022
Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2022

CVE-2021-46743

Publication date:
29/03/2022
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2022

CVE-2022-1086

Publication date:
29/03/2022
A vulnerability was found in DolphinPHP up to 1.5.0 and classified as problematic. Affected by this issue is the User Management Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: Pending analysis
Last modification:
05/04/2022

CVE-2022-1084

Publication date:
29/03/2022
A vulnerability classified as critical was found in SourceCodester One Church Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /one_church/userregister.php. The manipulation leads to authentication bypass. The attack can be launched remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2022

CVE-2022-1085

Publication date:
29/03/2022
A vulnerability was found in CLTPHP up to 6.0. It has been declared as problematic. Affected by this vulnerability is the POST Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: Pending analysis
Last modification:
05/04/2022