Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-38736

Publication date:
28/10/2022
SEMCMS Shop V 1.1 is vulnerable to SQL Injection via Ant_Global.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2021-38737

Publication date:
28/10/2022
SEMCMS v 1.1 is vulnerable to SQL Injection via Ant_Pro.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2021-37781

Publication date:
28/10/2022
Employee Record Management System v 1.2 is vulnerable to Cross Site Scripting (XSS) via editempprofile.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2021-35388

Publication date:
28/10/2022
Hospital Management System v 4.0 is vulnerable to Cross Site Scripting (XSS) via /hospital/hms/admin/patient-search.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2021-35387

Publication date:
28/10/2022
Hospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2022-43275

Publication date:
28/10/2022
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2022-43276

Publication date:
28/10/2022
Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the productId parameter at /php_action/fetchSelectedfood.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2022-3741

Publication date:
28/10/2022
Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2022

CVE-2022-3337

Publication date:
28/10/2022
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch  feature<br /> being enabled on Zero Trust Platform. This led to bypassing policies <br /> and restrictions enforced for enrolled devices by the Zero Trust <br /> platform.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3512

Publication date:
28/10/2022
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3322

Publication date:
28/10/2022
Lock Warp switch is a feature of Zero Trust platform which, when<br /> enabled, prevents users of enrolled devices from disabling WARP client.<br /> Due to insufficient policy verification by WARP iOS client, this <br /> feature could be bypassed by using the "Disable WARP" quick action.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3321

Publication date:
28/10/2022
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch  on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023