Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-42753

Publication date:
03/11/2022
SalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-42750

Publication date:
03/11/2022
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-3852

Publication date:
03/11/2022
The VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to delete, and modify calendars as well as the plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3675

Publication date:
03/11/2022
Fedora CoreOS supports setting a GRUB bootloader password<br /> using a Butane config. When this feature is enabled, GRUB requires a password to access the<br /> GRUB command-line, modify kernel command-line arguments, or boot<br /> non-default OSTree deployments. Recent Fedora CoreOS releases have a<br /> misconfiguration which allows booting non-default OSTree deployments<br /> without entering a password. This allows someone with access to the<br /> GRUB menu to boot into an older version of Fedora CoreOS, reverting<br /> any security fixes that have recently been applied to the machine. A<br /> password is still required to modify kernel command-line arguments and<br /> to access the GRUB command line.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3776

Publication date:
03/11/2022
The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on several functions called via AJAX actions such as forms_action, set_option, &amp; chosen_options to name a few . This makes it possible for unauthenticated attackers to perform a variety of administrative actions like modifying forms, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2696

Publication date:
03/11/2022
The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to authorization bypass via several AJAX actions in versions up to, and including 2.3.0 due to missing capability checks and missing nonce validation. This makes it possible for authenticated attackers with minimal permissions to perform a wide variety of actions such as modifying the plugin&amp;#39;s settings and modifying the ordering system preferences.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37823

Publication date:
03/11/2022
OpenCart 3.0.3.7 allows users to obtain database information or read server files through SQL injection in the background.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2020-22820

Publication date:
03/11/2022
MKCMS V6.2 has SQL injection via the /ucenter/repass.php name parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2020-22819

Publication date:
03/11/2022
MKCMS V6.2 has SQL injection via the /ucenter/active.php verify parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2020-22818

Publication date:
03/11/2022
MKCMS V6.2 has SQL injection via /ucenter/reg.php name parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-39371

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Script related HTML tags in assets inventory information are not properly neutralized. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39372

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022