Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-28114

Publication date:
28/04/2022
DSCMS v3.0 was discovered to contain an arbitrary file deletion vulnerability via /controller/Adv.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2022

CVE-2022-24892

Publication date:
28/04/2022
Shopware is an open source e-commerce software platform. Starting with version 5.0.4 and before version 5.7.9, multiple tokens for password reset can be requested. All tokens can be used to change the password. This makes it possible for an attacker to take over the victim's account if they somehow gain access to the victims email account and find an unused password reset token in the emails. This issue is fixed in version 5.7.9.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-28117

Publication date:
28/04/2022
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2022-24879

Publication date:
28/04/2022
Shopware is an open source e-commerce software platform. Versions prior to 5.7.9 are vulnerable to malfunction of cross-site request forgery (CSRF) token validation. Under certain circumstances, the CSRF tokens were not generated anew and not validated correctly. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2022

CVE-2021-43932

Publication date:
28/04/2022
Elcomplus SmartPTT is vulnerable when an attacker injects JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2021-43934

Publication date:
28/04/2022
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate upload requests, enabling a malicious user to potentially upload arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2022-22781

Publication date:
28/04/2022
The Zoom Client for Meetings for MacOS (Standard and for IT Admin) prior to version 5.9.6 failed to properly check the package version during the update process. This could lead to a malicious actor updating an unsuspecting user’s currently installed version to a less secure version.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2021-43939

Publication date:
28/04/2022
Elcomplus SmartPTT is vulnerable when a low-authenticated user can access higher level administration authorization by issuing requests directly to the desired endpoints.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022

CVE-2022-1511

Publication date:
28/04/2022
Missing Authorization in GitHub repository snipe/snipe-it prior to 5.4.4.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2022-22782

Publication date:
28/04/2022
The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user’s host machine.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-22783

Publication date:
28/04/2022
A vulnerability in Zoom On-Premise Meeting Connector Controller version 4.8.102.20220310 and On-Premise Meeting Connector MMR version 4.8.102.20220310 exposes process memory fragments to connected clients, which could be observed by a passive attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-43930

Publication date:
28/04/2022
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022