Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-24908

Publication date:
19/02/2021
Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2024

CVE-2021-26746

Publication date:
19/02/2021
Chamilo 1.11.14 allows XSS via a main/calendar/agenda_list.php?type= URI.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2021

CVE-2021-27405

Publication date:
19/02/2021
A ReDoS (regular expression denial of service) flaw was found in the @progfay/scrapbox-parser package before 6.0.3 for Node.js.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2021

CVE-2020-36246

Publication date:
19/02/2021
Amaze File Manager before 3.5.1 allows attackers to obtain root privileges via shell metacharacters in a symbolic link.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-25024

Publication date:
19/02/2021
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2021-27403

Publication date:
19/02/2021
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow cgi-bin/te_acceso_router.cgi curWebPage XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2021

CVE-2021-27404

Publication date:
19/02/2021
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2021

CVE-2020-19513

Publication date:
19/02/2021
Buffer overflow in FinalWire Ltd AIDA64 Engineer 6.00.5100 allows attackers to execute arbitrary code by creating a crafted input that will overwrite the SEH handler.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2021-26747

Publication date:
18/02/2021
Netis WF2780 2.3.40404 and WF2411 1.1.29629 devices allow Shell Metacharacter Injection into the ping command, leading to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2021

CVE-2021-26712

Publication date:
18/02/2021
Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2021

CVE-2021-26717

Publication date:
18/02/2021
An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2021

CVE-2020-35776

Publication date:
18/02/2021
A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2021