Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-46811

Publication date:
13/06/2022
HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2021-46813

Publication date:
13/06/2022
Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2022-31753

Publication date:
13/06/2022
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2022-31757

Publication date:
13/06/2022
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2022-31760

Publication date:
13/06/2022
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2022-31055

Publication date:
13/06/2022
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-31756

Publication date:
13/06/2022
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2022

CVE-2022-31759

Publication date:
13/06/2022
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2022

CVE-2022-31763

Publication date:
13/06/2022
The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2022

CVE-2022-31758

Publication date:
13/06/2022
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
21/06/2022

CVE-2022-31755

Publication date:
13/06/2022
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2022

CVE-2022-31762

Publication date:
13/06/2022
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2022