Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-46187

Publication date:
27/01/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-46188

Publication date:
27/01/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-21395

Publication date:
27/01/2023
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2023

CVE-2022-48072

Publication date:
27/01/2023
Phicomm K2G v22.6.3.20 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48071

Publication date:
27/01/2023
Phicomm K2 v22.6.534.263 was discovered to store the root and admin passwords in plaintext.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48070

Publication date:
27/01/2023
Phicomm K2 v22.6.534.263 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48073

Publication date:
27/01/2023
Phicomm K2G v22.6.3.20 was discovered to store the root and admin passwords in plaintext.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48069

Publication date:
27/01/2023
Totolink A830R V4.1.2cu.5182 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-47632

Publication date:
27/01/2023
Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48066

Publication date:
27/01/2023
An issue in the component global.so of Totolink A830R V4.1.2cu.5182 allows attackers to bypass authentication via a crafted cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48067

Publication date:
27/01/2023
An information disclosure vulnerability in Totolink A830R V4.1.2cu.5182 allows attackers to obtain the root password via a brute-force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44298

Publication date:
27/01/2023
SiteServer CMS 7.1.3 is vulnerable to SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025