Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-28379

Publication date:
15/03/2021
web/upload/UploadHandler.php in Vesta Control Panel (aka VestaCP) through 0.9.8-27 and myVesta through 0.9.8-26-39 allows uploads from a different origin.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021

CVE-2021-28378

Publication date:
15/03/2021
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021

CVE-2021-28375

Publication date:
15/03/2021
An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-28374

Publication date:
15/03/2021
The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash).
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-28373

Publication date:
13/03/2021
The auth_internal plugin in Tiny Tiny RSS (aka tt-rss) before 2021-03-12 allows an attacker to log in via the OTP code without a valid password. NOTE: this issue only affected the git master branch for a short time. However, all end users are explicitly directed to use the git master branch in production. Semantic version numbers such as 21.03 appear to exist, but are automatically generated from the year and month. They are not releases.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-28361

Publication date:
13/03/2021
An issue was discovered in Storage Performance Development Kit (SPDK) before 20.01.01. If a PDU is sent to the iSCSI target with a zero length (but data is expected), the iSCSI target can crash with a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2020-35682

Publication date:
13/03/2021
Zoho ManageEngine ServiceDesk Plus before 11134 allows an Authentication Bypass (only during SAML login).
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-20017

Publication date:
13/03/2021
A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021

CVE-2021-20018

Publication date:
13/03/2021
A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021

CVE-2021-28162

Publication date:
12/03/2021
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-28161

Publication date:
12/03/2021
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-27290

Publication date:
12/03/2021
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2022