Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-30516

Publication date:
26/05/2022
In Hospital-Management-System v1.0, the editid parameter in the doctor.php page is vulnerable to SQL injection attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2022-30493

Publication date:
26/05/2022
In oretnom23 Automotive Shop Management System v1.0, the product id parameter suffers from a blind SQL Injection Vulnerability allowing remote attackers to dump all database credential and gain admin access(privilege escalation).
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2022-30494

Publication date:
26/05/2022
In oretnom23 Automotive Shop Management System v1.0, the first and last name user fields suffer from a stored XSS Injection Vulnerability allowing remote attackers to gain admin access and view internal IPs.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2022-22576

Publication date:
26/05/2022
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023

CVE-2022-21831

Publication date:
26/05/2022
A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2022-22577

Publication date:
26/05/2022
An XSS Vulnerability in Action Pack >= 5.2.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2022-27777

Publication date:
26/05/2022
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2021-33014

Publication date:
26/05/2022
An attacker can gain VxWorks Shell after login due to hard-coded credentials on a KUKA KR C4 control software for versions prior to 8.7 or any product running KSS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2021-33016

Publication date:
26/05/2022
An attacker can gain full access (read/write/delete) to sensitive folders due to hard-coded credentials on KUKA KR C4 control software for versions prior to 8.7 or any product running KSS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1261

Publication date:
26/05/2022
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-21827

Publication date:
26/05/2022
An improper privilege vulnerability has been discovered in Citrix Gateway Plug-in for Windows (Citrix Secure Access for Windows)
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2021-4232

Publication date:
26/05/2022
A vulnerability classified as problematic has been found in Zoo Management System 1.0. Affected is an unknown function of the file admin/manage-ticket.php. The manipulation with the input alert(1) leads to cross site scripting. It is possible to launch the attack remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2023