Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24977

Publication date:
14/02/2022
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2022

CVE-2022-24110

Publication date:
14/02/2022
Kiteworks MFT 7.5 may allow an unauthorized user to reset other users' passwords. This is fixed in version 7.6 and later.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-0575

Publication date:
14/02/2022
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2022

CVE-2022-0576

Publication date:
14/02/2022
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2022

CVE-2022-0572

Publication date:
14/02/2022
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2022-0570

Publication date:
14/02/2022
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2022

CVE-2022-0571

Publication date:
14/02/2022
Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0569

Publication date:
14/02/2022
Observable Discrepancy in Packagist snipe/snipe-it prior to v5.3.9.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2022-0565

Publication date:
14/02/2022
Cross-site Scripting in Packagist pimcore/pimcore prior to 10.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2022-0206

Publication date:
14/02/2022
The NewStatPress WordPress plugin before 1.3.6 does not properly escape the whatX parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2022

CVE-2022-0190

Publication date:
14/02/2022
The Ad Invalid Click Protector (AICP) WordPress plugin before 1.2.6 is affected by a SQL Injection in the id parameter of the delete action.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2022

CVE-2022-0193

Publication date:
14/02/2022
The Complianz WordPress plugin before 6.0.0 does not escape the s parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2022