Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48517

Publication date:
06/07/2023
Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2022-48518

Publication date:
06/07/2023
Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2022-48519

Publication date:
06/07/2023
Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2022-48520

Publication date:
06/07/2023
Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2023-1691

Publication date:
06/07/2023
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2023-1695

Publication date:
06/07/2023
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2023-34164

Publication date:
06/07/2023
Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2023-37238

Publication date:
06/07/2023
Vulnerability of apps' permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2021-46892

Publication date:
06/07/2023
Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2021-46894

Publication date:
06/07/2023
Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2023

CVE-2023-3523

Publication date:
06/07/2023
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2023-26137

Publication date:
06/07/2023
All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023