Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-45689

Publication date:
13/12/2022
hutool-json v5.8.10 was discovered to contain an out of memory error.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-44636

Publication date:
13/12/2022
The Samsung TV (2021 and 2022 model) smart remote control allows attackers to enable microphone access via Bluetooth spoofing when a user is activating remote control by pressing a button. This is fixed in xxx72510, E9172511 for 2021 models, xxxA1000, 4x2A0200 for 2022 models.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-45688

Publication date:
13/12/2022
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2022-29580

Publication date:
13/12/2022
There exists a path traversal vulnerability in the Android Google Search app. This is caused by the incorrect usage of uri.getLastPathSegment. A symbolic encoded string can bypass the path logic to get access to unintended directories. An attacker can manipulate paths that could lead to code execution on the device. We recommend upgrading beyond version 13.41
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2021-32415

Publication date:
13/12/2022
EXEMSI MSI Wrapper Versions prior to 10.0.50 and at least since version 6.0.91 will introduce a local privilege escalation vulnerability in installers it creates.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46047

Publication date:
13/12/2022
AeroCMS v0.0.1 is vulnerable to SQL Injection via the delete parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46058

Publication date:
13/12/2022
AeroCMS v0.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via add_post.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comments text field.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46061

Publication date:
13/12/2022
AeroCMS v0.0.1 is vulnerable to ClickJacking.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-38124

Publication date:
13/12/2022
Debug tool in Secomea SiteManager allows logged-in administrator to modify system state in an unintended manner.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2022

CVE-2022-4446

Publication date:
13/12/2022
PHP Remote File Inclusion in GitHub repository tsolucio/corebos prior to 8.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2022

CVE-2022-4444

Publication date:
13/12/2022
A vulnerability was found in ipti br.tag. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.13.0 is able to address this issue. The name of the patch is 7e311be22d3a0a1b53e61cb987ba13d681d85f06. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215431.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23523

Publication date:
13/12/2022
In versions prior to 0.8.1, the linux-loader crate uses the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets point beyond the end of the file this could lead to Virtual Machine Monitors using the `linux-loader` crate entering an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner. This issue has been addressed in 0.8.1. The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers do not point beyond the end of the file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023