Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-36604

Publication date:
23/09/2022
hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisoning in the clone function.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-41322

Publication date:
23/09/2022
In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.
Severity CVSS v4.0: Pending analysis
Last modification:
01/06/2025

CVE-2022-41319

Publication date:
23/09/2022
A Reflected Cross-Site Scripting (XSS) vulnerability affects the Veritas Desktop Laptop Option (DLO) application login page (aka the DLOServer/restore/login.jsp URI). This affects versions before 9.8 (e.g., 9.1 through 9.7).
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-41320

Publication date:
23/09/2022
Veritas System Recovery (VSR) versions 18 and 21 store a network destination password in the Windows registry during configuration of the backup configuration. This vulnerability could provide a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-35951

Publication date:
23/09/2022
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-37232

Publication date:
23/09/2022
Netgear N300 wireless router wnr2000v4-V1.0.0.70 is vulnerable to Buffer Overflow via uhttpd. There is a stack overflow vulnerability caused by strcpy.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2022

CVE-2022-37235

Publication date:
23/09/2022
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncat
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2021-41803

Publication date:
23/09/2022
HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-40298

Publication date:
23/09/2022
Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-38573

Publication date:
23/09/2022
10-Strike Network Inventory Explorer v9.3 was discovered to contain a buffer overflow via the Add Computers function.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-30426

Publication date:
23/09/2022
There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2022-36934

Publication date:
22/09/2022
An integer overflow in WhatsApp could result in remote code execution in an established video call.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025