Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-21778

Publication date:
08/11/2022
In vpu, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06382421; Issue ID: ALPS06382421.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-33322

Publication date:
08/11/2022
Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user&amp;#39;s browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric&amp;#39;s advisory which is listed in [References] section.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-39377

Publication date:
08/11/2022
sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2022-33321

Publication date:
08/11/2022
Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password).<br /> The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability.<br /> As for the affected product models/versions, see the Mitsubishi Electric&amp;#39;s advisory which is listed in [References] section.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-44741

Publication date:
08/11/2022
Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) in David Anderson Testimonial Slider plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-43481

Publication date:
08/11/2022
Cross-Site Request Forgery (CSRF) vulnerability in Advanced Coupons for WooCommerce Coupons plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-43491

Publication date:
08/11/2022
Cross-Site Request Forgery (CSRF) vulnerability in Advanced Dynamic Pricing for WooCommerce plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-41980

Publication date:
08/11/2022
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Mantenimiento web plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-42494

Publication date:
08/11/2022
Server Side Request Forgery (SSRF) vulnerability in All in One SEO Pro plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-41136

Publication date:
08/11/2022
Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in Vladimir Anokhin&amp;#39;s Shortcodes Ultimate plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-40632

Publication date:
08/11/2022
Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team wpForo Forum plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022

CVE-2022-40223

Publication date:
08/11/2022
Nonce token leakage and missing authorization in SearchWP premium plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2022