Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-43977

Publication date:
17/11/2021
SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-32234

Publication date:
17/11/2021
SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-40745

Publication date:
17/11/2021
Adobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2021-42250

Publication date:
17/11/2021
Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2021-29861

Publication date:
17/11/2021
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in EFS to expose sensitive information. IBM X-Force ID: 206085.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2021

CVE-2021-38959

Publication date:
17/11/2021
IBM SPSS Statistics for Windows 24.0, 25.0, 26.0, 27.0, 27.0.1, and 28.0 could allow a local user to cause a denial of service by writing arbitrary files to admin protected directories on the system. IBM X-Force ID: 212046.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2021

CVE-2021-29860

Publication date:
17/11/2021
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the libc.a library to expose sensitive information. IBM X-Force ID: 206084.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-42954

Publication date:
17/11/2021
Zoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admin or any guest users), thereby allowing privilege escalation, unauthorized password reset, stealing of sensitive data, access to credentials in plaintext, access to registry values, tampering with configuration files, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-42955

Publication date:
17/11/2021
Zoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the Remote Access Plus Server Admin account.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-42956

Publication date:
17/11/2021
Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-41931

Publication date:
17/11/2021
The Company's Recruitment Management System in id=2 of the parameter from view_vacancy app on-page appears to be vulnerable to SQL injection. The payloads 19424269' or '1309'='1309 and 39476597' or '2917'='2923 were each submitted in the id parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-32600

Publication date:
17/11/2021
An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS CLI 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, 6.0.x and 5.6.x may allow a local and authenticated user assigned to a specific VDOM to retrieve other VDOMs information such as the admin account list and the network interface list.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022