Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-22942

Publication date:
18/10/2021
A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2010-2496

Publication date:
18/10/2021
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2021-41611

Publication date:
18/10/2021
An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-38562

Publication date:
18/10/2021
Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42565

Publication date:
18/10/2021
myfactory.FMS before 7.1-912 allows XSS via the UID parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2021

CVE-2021-42566

Publication date:
18/10/2021
myfactory.FMS before 7.1-912 allows XSS via the Error parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2021

CVE-2021-36097

Publication date:
18/10/2021
Agents are able to lock the ticket without the "Owner" permission. Once the ticket is locked, it could be moved to the queue where the agent has "rw" permissions and gain a full control. This issue affects: OTRS AG OTRS 8.0.x version: 8.0.16 and prior versions.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2021-38297

Publication date:
18/10/2021
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-16060

Publication date:
15/10/2021
Mitsubishi Electric Europe B.V. SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2018-16061

Publication date:
15/10/2021
Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2021-27561

Publication date:
15/10/2021
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2021-41320

Publication date:
15/10/2021
A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time).
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025