Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-21066

Publication date:
13/08/2021
An issue was discovered in Bento4 v1.5.1.0. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a denial of service (program crash), as demonstrated by mp42aac.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2020-21064

Publication date:
13/08/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15048. Reason: This candidate is a reservation duplicate of CVE-2019-15048. Notes: All CVE users should reference CVE-2019-15048 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37705

Publication date:
13/08/2021
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information, security testing tools and proprietary code and symbols. Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2021-21829

Publication date:
13/08/2021
A heap-based buffer overflow vulnerability exists in the XML Decompression EnumerationUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-21830

Publication date:
13/08/2021
A heap-based buffer overflow vulnerability exists in the XML Decompression LabelDict::Load functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-36787

Publication date:
13/08/2021
The femanager extension before 5.5.1 and 6.x before 6.3.1 for TYPO3 allows XSS via a crafted SVG document.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-38302

Publication date:
13/08/2021
The Newsletter extension through 4.0.0 for TYPO3 allows SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-36786

Publication date:
13/08/2021
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-38623

Publication date:
13/08/2021
The deferred_image_processing (aka Deferred image processing) extension before 1.0.2 for TYPO3 allows Denial of Service via the FAL API because of /var/transient disk consumption.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-36785

Publication date:
13/08/2021
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2021

CVE-2021-36790

Publication date:
13/08/2021
The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2021

CVE-2021-36789

Publication date:
13/08/2021
The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 allows SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2021