Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-21123

Publication date:
15/06/2022
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-32433

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to Arbitrary code execution via ip/school/view/all_teacher.php.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32381

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_admin_profile.php?my_index=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32380

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_student_subject.php?index=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32379

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_parents_profile.php?my_index=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32378

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_teacher_profile.php?my_index=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32377

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_exam_timetable.php?id=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32376

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_events.php?event_id=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32375

Publication date:
15/06/2022
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_timetable.php?id=.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-29450

Publication date:
15/06/2022
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Admin Management Xtended plugin
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2022-31044

Publication date:
15/06/2022
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. The Key Storage converter plugin mechanism was not enabled correctly in Rundeck 4.2.0 and 4.2.1, resulting in use of the encryption layer for Key Storage possibly not working. Any credentials created or overwritten using Rundeck 4.2.0 or 4.2.1 might result in them being written in plaintext to the backend storage. This affects those using any `Storage Converter` plugin. Rundeck 4.3.1 and 4.2.2 have fixed the code and upon upgrade will re-encrypt any plain text values. Version 4.3.0 does not have the vulnerability, but does not include the patch to re-encrypt plain text values if 4.2.0 or 4.2.1 were used. To prevent plaintext credentials from being stored in Rundeck 4.2.0/4.2.1, write access to key storage can be disabled via ACLs. After upgrading to 4.3.1 or later, write access can be restored.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-32550

Publication date:
15/06/2022
An issue was discovered in AgileBits 1Password, involving the method various 1Password apps and integrations used to create connections to the 1Password service. In specific circumstances, this issue allowed a malicious server to convince a 1Password app or integration it is communicating with the 1Password service.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2024