Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24948

Publication date:
25/02/2022
A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2022-24288

Publication date:
25/02/2022
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2021-45229

Publication date:
25/02/2022
It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2022-0746

Publication date:
25/02/2022
Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2022

CVE-2021-34361

Publication date:
25/02/2022
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2022

CVE-2021-34359

Publication date:
25/02/2022
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2022

CVE-2022-23835

Publication date:
25/02/2022
The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2021-43745

Publication date:
24/02/2022
A Denial of Service vulnerabilty exists in Trilium Notes 0.48.6 in the setupPage function
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2021-29216

Publication date:
24/02/2022
A remote cross-site scripting vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2021-29217

Publication date:
24/02/2022
A remote URL redirection vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2022

CVE-2021-29220

Publication date:
24/02/2022
Multiple buffer overflow security vulnerabilities have been identified in HPE iLO Amplifier Pack version(s): Prior to 2.12. These vulnerabilities could be exploited by a highly privileged user to remotely execute code that could lead to a loss of confidentiality, integrity, and availability. HPE has provided a software update to resolve this vulnerability in HPE iLO Amplifier Pack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2022

CVE-2022-23701

Publication date:
24/02/2022
A potential remote host header injection security vulnerability has been identified in HPE Integrated Lights-Out 4 (iLO 4) firmware version(s): Prior to 2.60. This vulnerability could be remotely exploited to allow an attacker to supply invalid input to the iLO 4 webserver, causing it to respond with a redirect to an attacker-controlled domain. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 4 (iLO 4).
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2022