Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1182

Publication date:
16/05/2022
The Visual Slide Box Builder WordPress plugin through 3.2.9 does not sanitise and escape various parameters before using them in SQL statements via some of its AJAX actions available to any authenticated users (such as subscriber), leading to SQL Injections
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-1103

Publication date:
16/05/2022
The Advanced Uploader WordPress plugin through 4.2 allows any authenticated users like subscriber to upload arbitrary files, such as PHP, which could lead to RCE
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2022

CVE-2022-0873

Publication date:
16/05/2022
The Gmedia Photo Gallery WordPress plugin before 1.20.0 does not sanitise and escape the Album's name before outputting it in pages/posts with a media embed, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered-html capability is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2022

CVE-2022-0578

Publication date:
16/05/2022
Code Injection in GitHub repository publify/publify prior to 9.2.8.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-30013

Publication date:
16/05/2022
A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-30776

Publication date:
16/05/2022
atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-30777

Publication date:
16/05/2022
Parallels H-Sphere 3.6.1713 allows XSS via the index_en.php from parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-29622

Publication date:
16/05/2022
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-29623

Publication date:
16/05/2022
An arbitrary file upload vulnerability in the file upload module of Express Connect-Multiparty 2.2.0 allows attackers to execute arbitrary code via a crafted PDF file. NOTE: the Supplier has not verified this vulnerability report.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2021-41927

Publication date:
16/05/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42966

Publication date:
16/05/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42870

Publication date:
16/05/2022
ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022