Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28088

Publication date:
25/04/2023
An HPE OneView appliance dump may expose SAN switch administrative credentials
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2023-28087

Publication date:
25/04/2023
An HPE OneView appliance dump may expose OneView user accounts
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2023-28086

Publication date:
25/04/2023
An HPE OneView appliance dump may expose proxy credential settings
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2023-25485

Publication date:
25/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bernhard Kux JSON Content Importer plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2023

CVE-2023-25793

Publication date:
25/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in George Pattihis Link Juice Keeper plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2023

CVE-2022-23721

Publication date:
25/04/2023
PingID integration for Windows login prior to 2.9 does not handle duplicate usernames, which can lead to a username collision when two people with the same username are provisioned onto the same machine at different times.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2022-40482

Publication date:
25/04/2023
The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2022-40722

Publication date:
25/04/2023
A misconfiguration of RSA padding implemented in the PingID Adapter for PingFederate to support Offline MFA with PingID mobile authenticators is vulnerable to pre-computed dictionary attacks, leading to a bypass of offline MFA.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2022-40723

Publication date:
25/04/2023
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2022-40724

Publication date:
25/04/2023
The PingFederate Local Identity Profiles '/pf/idprofile.ping' endpoint is vulnerable to Cross-Site Request Forgery (CSRF) through crafted GET requests.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2022-40725

Publication date:
25/04/2023
PingID Desktop prior to the latest released version 1.7.4 contains a vulnerability that can be exploited to bypass the maximum PIN attempts permitted before the time-based lockout is activated.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2022-45291

Publication date:
25/04/2023
PWS Personal Weather Station Dashboard (PWS_Dashboard) LTS December 2020 (2012_lts) allows remote code execution by injecting PHP code into settings.php. Attacks can use the PWS_printfile.php, PWS_frame_text.php, PWS_listfile.php, PWS_winter.php, and PWS_easyweathersetup.php endpoints. A contributing factor is a hardcoded login password of support, which is not documented. (This is not the same as the documented setup password, which is 12345.) The issue was fixed in late 2022.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025