Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-36467

Publication date:
08/08/2021
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr::get returns more than one mutable reference to the same object.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2021-38190

Publication date:
08/08/2021
An issue was discovered in the nalgebra crate before 0.27.1 for Rust. It allows out-of-bounds memory access because it does not ensure that the number of elements is equal to the product of the row count and column count.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36468

Publication date:
08/08/2021
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr::write performs non-atomic write operations on an underlying pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36469

Publication date:
08/08/2021
An issue was discovered in the appendix crate through 2020-11-15 for Rust. For the generic K and V type parameters, Send and Sync are implemented unconditionally.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36470

Publication date:
08/08/2021
An issue was discovered in the disrustor crate through 2020-12-17 for Rust. RingBuffer doe not properly limit the number of mutable references.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36471

Publication date:
08/08/2021
An issue was discovered in the generator crate before 0.7.0 for Rust. It does not ensure that a function (for yielding values) has Send bounds.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36472

Publication date:
08/08/2021
An issue was discovered in the max7301 crate before 0.2.0 for Rust. The ImmediateIO and TransactionalIO types implement Sync for all Expander types that they contain.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2021-38187

Publication date:
08/08/2021
An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2021-38189

Publication date:
08/08/2021
An issue was discovered in the lettre crate before 0.9.6 for Rust. In an e-mail message body, an attacker can place a . character after two sequences and then inject arbitrary SMTP commands.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-36462

Publication date:
08/08/2021
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2021

CVE-2020-36463

Publication date:
08/08/2021
An issue was discovered in the multiqueue crate through 2020-12-25 for Rust. There are unconditional implementations of Send for InnerSend, InnerRecv, FutInnerSend, and FutInnerRecv.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2021

CVE-2021-38186

Publication date:
08/08/2021
An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2021