Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24758

Publication date:
31/03/2022
The Jupyter notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.9, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter notebook version 6.4.x contains a patch for this issue. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2022

CVE-2021-46439

Publication date:
31/03/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation sho
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-43722

Publication date:
31/03/2022
D-Link DIR-645 1.03 A1 is vulnerable to Buffer Overflow. The hnap_main function in the cgibin handler uses sprintf to format the soapaction header onto the stack and has no limit on the size.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2022

CVE-2022-26546

Publication date:
31/03/2022
Hospital Management System v1.0 was discovered to lack an authorization component, allowing attackers to access sensitive information and obtain the admin password.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2021-43707

Publication date:
31/03/2022
Cross Site Scripting (XSS) vulnerability exists in Maccms v10 via link_Name parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2022

CVE-2021-43479

Publication date:
31/03/2022
A Remote Code Execution (RCE) vulnerability exists in The-Secretary 2.5 via install.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2022

CVE-2021-43478

Publication date:
31/03/2022
A vulnerability exists in Hoosk 1.8.0 in /install/index.php, due to a failure to check if config.php already exists in the root directory, which could let a malicious user reinstall the website.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2022

CVE-2021-37517

Publication date:
31/03/2022
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.0,in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2022

CVE-2021-43484

Publication date:
31/03/2022
A Remote Code Execution (RCE) vulnerability exists in Simple Client Management System 1.0 in create.php due to the failure to validate the extension of the file being sent in a request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2022

CVE-2022-22311

Publication date:
31/03/2022
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2022

CVE-2021-42946

Publication date:
31/03/2022
A Cross Site Scripting (XSS) vulnerability exists in htmly.2.8.1 via the Copyright field in the /admin/config page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2022

CVE-2021-42868

Publication date:
31/03/2022
A Cross Site Scripting (XSS) vulnerability exists in Chikista Patient Management Software 2.0.2 in the first_name parameter in (1) patient/insert, (2) patient_report, (3) appointment_report, (4) visit_report, and (5) bill_detail_report pages. .
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024