Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-25056

Publication date:
26/01/2022
In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2022

CVE-2022-0355

Publication date:
26/01/2022
Improper Removal of Sensitive Information Before Storage or Transfer in NPM simple-get prior to 4.0.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2023

CVE-2021-46560

Publication date:
26/01/2022
The firmware on Moxa TN-5900 devices through 3.1 allows command injection that could lead to device damage.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2022

CVE-2021-46559

Publication date:
26/01/2022
The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-23959

Publication date:
26/01/2022
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-36296

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36295

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36294

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability by forging a cookie to login as any user.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36289

Publication date:
25/01/2022
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36348

Publication date:
25/01/2022
iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36347

Publication date:
25/01/2022
iDRAC9 versions prior to 5.00.20.00 and iDRAC8 versions prior to 2.82.82.82 contain a stack-based buffer overflow vulnerability. An authenticated remote attacker with high privileges could potentially exploit this vulnerability to control process execution and gain access to the iDRAC operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2021-36346

Publication date:
25/01/2022
Dell iDRAC 8 prior to version 2.82.82.82 contain a denial of service vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to deny access to the iDRAC webserver.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022