Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-21944

Publication date:
26/01/2022
A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-SP3, Factory allows local attackers to escalate to root. This issue affects: openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0. openSUSE Factory watchman versions prior to 4.9.0-9.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2023

CVE-2022-23968

Publication date:
26/01/2022
Xerox VersaLink devices on specific versions of firmware before 2022-01-26 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61. NOTE: the 2022-01-24 NeoSmart article included "believed to affect all previous and later versions as of the date of this posting" but a 2022-01-26 vendor statement reports "the latest versions of firmware are not vulnerable to this issue."
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2019-25056

Publication date:
26/01/2022
In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2022

CVE-2022-0355

Publication date:
26/01/2022
Improper Removal of Sensitive Information Before Storage or Transfer in NPM simple-get prior to 4.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2021-46560

Publication date:
26/01/2022
The firmware on Moxa TN-5900 devices through 3.1 allows command injection that could lead to device damage.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2022

CVE-2021-46559

Publication date:
26/01/2022
The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-23959

Publication date:
26/01/2022
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-36296

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36295

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36294

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability by forging a cookie to login as any user.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36289

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36348

Publication date:
25/01/2022
iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022