Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-34073

Publication date:
28/01/2022
A Cross Site Scripting (XSS) vulnerabilty exists in Sourcecodester Gadget Works Online Ordering System in PHP/MySQLi 1.0 via the Category parameter in an add function in category/index.php.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2022

CVE-2022-22294

Publication date:
28/01/2022
A SQL injection vulnerability exists in ZFAKA
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2022

CVE-2021-45897

Publication date:
28/01/2022
SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-23863

Publication date:
28/01/2022
Zoho ManageEngine Desktop Central before 10.1.2137.10 allows an authenticated user to change any user's login password.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2020-25905

Publication date:
28/01/2022
An SQL Injection vulnerabilty exists in Sourcecodester Mobile Shop System in PHP MySQL 1.0 via the email parameter in (1) login.php or (2) LoginAsAdmin.php.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2023

CVE-2022-23096

Publication date:
28/01/2022
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2024

CVE-2022-23097

Publication date:
28/01/2022
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023

CVE-2022-23098

Publication date:
28/01/2022
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023

CVE-2021-44249

Publication date:
28/01/2022
Online Motorcycle (Bike) Rental System 1.0 is vulnerable to a Blind Time-Based SQL Injection attack within the login portal. This can lead attackers to remotely dump MySQL database credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2022

CVE-2021-45435

Publication date:
28/01/2022
An SQL Injection vulnerability exists in Sourcecodester Simple Cold Storage Management System using PHP/OOP 1.0 via the username field in login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2021-42791

Publication date:
28/01/2022
An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2022

CVE-2020-28885

Publication date:
28/01/2022
Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject commands through the Gogo Shell module to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to access and execute commands in Gogo Shell and therefore not a design fla
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024