Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-40505

Publication date:
02/05/2023
Information disclosure due to buffer over-read in Modem while parsing DNS hostname.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-34144

Publication date:
02/05/2023
Transient DOS due to reachable assertion in Modem during OSI decode scheduling.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-40508

Publication date:
02/05/2023
Transient DOS due to reachable assertion in Modem while processing config related to cross carrier scheduling, which is not supported.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-33305

Publication date:
02/05/2023
Transient DOS due to NULL pointer dereference in Modem while sending invalid messages in DCCH.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-33304

Publication date:
02/05/2023
Transient DOS due to NULL pointer dereference in Modem while performing pullup for received TCP/UDP packet.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-33292

Publication date:
02/05/2023
Memory corruption in Qualcomm IPC due to use after free while receiving the incoming packet and reposting it.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-33281

Publication date:
02/05/2023
Memory corruption due to improper validation of array index in computer vision while testing EVA kernel without sending any frames.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2022-25713

Publication date:
02/05/2023
Memory corruption in Automotive due to Improper Restriction of Operations within the Bounds of a Memory Buffer while exporting a shared key.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2023-2247

Publication date:
02/05/2023
In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2022-48483

Publication date:
02/05/2023
3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025

CVE-2022-48482

Publication date:
02/05/2023
3CX before 18 Update 2 Security Hotfix build 18.0.2.315 on Windows allows unauthenticated remote attackers to read certain files via /Electron/download directory traversal. Files may have credentials, full backups, call recordings, and chat logs.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025

CVE-2013-10026

Publication date:
02/05/2023
A vulnerability, which was classified as problematic, has been found in Mail Subscribe List Plugin up to 2.0.10 on WordPress. This issue affects some unknown processing of the file index.php. The manipulation of the argument sml_name/sml_email leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.1 is able to address this issue. The identifier of the patch is 484970ef8285cae51d2de3bd4e4684d33c956c28. It is recommended to upgrade the affected component. The identifier VDB-227765 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024