Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-29580

Publication date:
13/12/2022
There exists a path traversal vulnerability in the Android Google Search app. This is caused by the incorrect usage of uri.getLastPathSegment. A symbolic encoded string can bypass the path logic to get access to unintended directories. An attacker can manipulate paths that could lead to code execution on the device. We recommend upgrading beyond version 13.41
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2021-32415

Publication date:
13/12/2022
EXEMSI MSI Wrapper Versions prior to 10.0.50 and at least since version 6.0.91 will introduce a local privilege escalation vulnerability in installers it creates.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46047

Publication date:
13/12/2022
AeroCMS v0.0.1 is vulnerable to SQL Injection via the delete parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46058

Publication date:
13/12/2022
AeroCMS v0.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via add_post.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comments text field.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-46061

Publication date:
13/12/2022
AeroCMS v0.0.1 is vulnerable to ClickJacking.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-38124

Publication date:
13/12/2022
Debug tool in Secomea SiteManager allows logged-in administrator to modify system state in an unintended manner.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2022

CVE-2022-4446

Publication date:
13/12/2022
PHP Remote File Inclusion in GitHub repository tsolucio/corebos prior to 8.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2022

CVE-2022-4444

Publication date:
13/12/2022
A vulnerability was found in ipti br.tag. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.13.0 is able to address this issue. The name of the patch is 7e311be22d3a0a1b53e61cb987ba13d681d85f06. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215431.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23523

Publication date:
13/12/2022
In versions prior to 0.8.1, the linux-loader crate uses the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets point beyond the end of the file this could lead to Virtual Machine Monitors using the `linux-loader` crate entering an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner. This issue has been addressed in 0.8.1. The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers do not point beyond the end of the file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-4098

Publication date:
13/12/2022
Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2023

CVE-2022-23505

Publication date:
13/12/2022
Passport-wsfed-saml2 is a ws-federation protocol and SAML2 tokens authentication provider for Passport. In versions prior to 4.6.3, a remote attacker may be able to bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. This issue is patched in version 4.6.3. Use of SAML2 authentication instead of WSFed is a workaround.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2023

CVE-2022-46160

Publication date:
13/12/2022
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.104, project level authorizations are not properly verified when accessing the project "homepage"/dashboards. Users not authorized to access a project may still be able to get some information provided by the widgets (e.g. number of members, content of the Notes widget...). This issue has been patched in Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4, and Tuleap Enterprise Edition 14.1-5.
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2022