Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-37897

Publication date:
12/12/2022
There is a command injection vulnerability that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37898

Publication date:
12/12/2022
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37899

Publication date:
12/12/2022
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37900

Publication date:
12/12/2022
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2022-37901

Publication date:
12/12/2022
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37902

Publication date:
12/12/2022
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37904

Publication date:
12/12/2022
Vulnerabilities in ArubaOS running on 7xxx series controllers exist that allows an attacker to execute arbitrary code during the boot sequence. Successful exploitation could allow an attacker to achieve permanent modification of the underlying operating system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-37905

Publication date:
12/12/2022
Vulnerabilities in ArubaOS running on 7xxx series controllers exist that allows an attacker to execute arbitrary code during the boot sequence. Successful exploitation could allow an attacker to achieve permanent modification of the underlying operating system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-32537

Publication date:
12/12/2022
A vulnerability exists which could allow an unauthorized user to learn aspects of the communication protocol used to pair system components while the pump is being paired with other system components. Exploitation requires nearby wireless signal proximity with the patient and the device; advanced technical knowledge is required for exploitation. Please refer to the Medtronic Product Security Bulletin for guidance
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2022-23511

Publication date:
12/12/2022
A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows, software for collecting metrics and logs from Amazon EC2 instances and on-premises servers, in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt as NT AUTHORITY\SYSTEM. To trigger this issue, the third party must be able to access the affected host and elevate their privileges such that they&amp;#39;re able to trigger the agent repair process. They must also be able to install the tools required to trigger the issue. This issue does not affect the CloudWatch Agent for macOS or Linux. Agent users should upgrade to version 1.247355 of the CloudWatch Agent to address this issue. There is no recommended work around. Affected users must update the installed version of the CloudWatch Agent to address this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2023

CVE-2021-46846

Publication date:
12/12/2022
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2021-3821

Publication date:
12/12/2022
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Denial of Service when running HP Workpath solutions on potentially affected products.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025