Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48071

Publication date:
27/01/2023
Phicomm K2 v22.6.534.263 was discovered to store the root and admin passwords in plaintext.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48070

Publication date:
27/01/2023
Phicomm K2 v22.6.534.263 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48073

Publication date:
27/01/2023
Phicomm K2G v22.6.3.20 was discovered to store the root and admin passwords in plaintext.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48069

Publication date:
27/01/2023
Totolink A830R V4.1.2cu.5182 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-47632

Publication date:
27/01/2023
Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48066

Publication date:
27/01/2023
An issue in the component global.so of Totolink A830R V4.1.2cu.5182 allows attackers to bypass authentication via a crafted cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-48067

Publication date:
27/01/2023
An information disclosure vulnerability in Totolink A830R V4.1.2cu.5182 allows attackers to obtain the root password via a brute-force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44298

Publication date:
27/01/2023
SiteServer CMS 7.1.3 is vulnerable to SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44715

Publication date:
27/01/2023
Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44717

Publication date:
27/01/2023
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44718

Publication date:
27/01/2023
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2022-44029

Publication date:
27/01/2023
An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 6 of 6.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025