Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-20222

Publication date:
23/03/2021
A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2022

CVE-2021-20227

Publication date:
23/03/2021
A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2022

CVE-2021-21376

Publication date:
23/03/2021
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2021

CVE-2021-21377

Publication date:
23/03/2021
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2021

CVE-2020-7346

Publication date:
23/03/2021
Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows prior to 11.6.100 allows a local, low privileged, attacker through the use of junctions to cause the product to load DLLs of the attacker's choosing. This requires the creation and removal of junctions by the attacker along with sending a specific IOTL command at the correct time.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2021-27310

Publication date:
23/03/2021
Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "language" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2021

CVE-2021-27309

Publication date:
23/03/2021
Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "module" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2021

CVE-2021-27526

Publication date:
23/03/2021
A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "page" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2021

CVE-2021-27531

Publication date:
23/03/2021
A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "query" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2021

CVE-2021-27529

Publication date:
23/03/2021
A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "limit" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2021

CVE-2021-27527

Publication date:
23/03/2021
A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "valueID" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2021

CVE-2021-27528

Publication date:
23/03/2021
A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "refID" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2021