Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-22818

Publication date:
03/11/2022
MKCMS V6.2 has SQL injection via /ucenter/reg.php name parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-39371

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Script related HTML tags in assets inventory information are not properly neutralized. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39372

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39373

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39375

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39376

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39370

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-39277

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. This issue has been patched, please upgrade to GLPI 10.0.4. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-39323

Publication date:
03/11/2022
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-44646

Publication date:
03/11/2022
In JetBrains TeamCity version before 2022.10, no audit items were added upon editing a user's settings
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-44624

Publication date:
03/11/2022
In JetBrains TeamCity version before 2022.10, Password parameters could be exposed in the build log if they contained special characters
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2022-44622

Publication date:
03/11/2022
In JetBrains TeamCity version between 2021.2 and 2022.10 access permissions for secure token health items were excessive
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2022