Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-46401

Publication date:
19/12/2022
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-3752

Publication date:
19/12/2022
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic <br /> loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload <br /> the user project file to bring the device back online and continue normal operation.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-44109

Publication date:
19/12/2022
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int).
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-44108

Publication date:
19/12/2022
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Object::copy(Object*):Object.cc.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-46399

Publication date:
19/12/2022
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) is unresponsive with ConReqTimeoutZero.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-46400

Publication date:
19/12/2022
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-44940

Publication date:
19/12/2022
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-40434

Publication date:
19/12/2022
Softr v2.0 was discovered to be vulnerable to HTML injection via the Name field of the Account page.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-23536

Publication date:
19/12/2022
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23543

Publication date:
19/12/2022
Silverware Games is a social network where people can play games online. Users can attach URLs to YouTube videos, the site will generate related `` when the post will be published. The handler has some sort of protection so non-YouTube links can&amp;#39;t be posted, as well as HTML tags are being stripped. However, it was still possible to add custom HTML attributes (e.g. `onclick=alert("xss")`) to the `&amp;#39;. This issue was fixed in the version `1.1.34` and does not require any extra actions from our members. There has been no evidence that this vulnerability was used by anyone at this time.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2022

CVE-2022-45041

Publication date:
19/12/2022
SQL Injection exits in xinhu
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-43887

Publication date:
19/12/2022
<br /> IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to sensitive information exposure by passing API keys to log files. If these keys contain sensitive information, it could lead to further attacks. IBM X-Force ID: 240450.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023