Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-44847

Publication date:
13/12/2021
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-44833

Publication date:
12/12/2021
The CLI 1.0.0 for Amazon AWS OpenSearch has weak permissions for the configuration file.
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2021

CVE-2021-41805

Publication date:
12/12/2021
HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2021-44515

Publication date:
12/12/2021
Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2021-4097

Publication date:
12/12/2021
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2021

CVE-2021-4092

Publication date:
11/12/2021
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-41242

Publication date:
10/12/2021
OpenOlat is a web-basedlearning management system. A path traversal vulnerability exists in OpenOlat prior to versions 15.5.12 and 16.0.5. By providing a filename that contains a relative path as a parameter in some REST methods, it is possible to create directory structures and write files anywhere on the target system. The attack could be used to write files anywhere in the web root folder or outside, depending on the configuration of the system and the properly configured permission of the application server user. The attack requires an OpenOlat user account, an enabled REST API and the rights on a business object to call the vulnerable REST calls. The problem is fixed in version 15.5.12 and 16.0.5. There is a workaround available. The vulnerability requires the REST module to be enabled. Disabling the REST module or limiting the REST module via some firewall or web-server access rules to be accessed only be trusted systems will mitigate the risk.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022

CVE-2021-26340

Publication date:
10/12/2021
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2021

CVE-2020-12890

Publication date:
10/12/2021
Improper handling of pointers in the System Management Mode (SMM) handling code may allow for a privileged attacker with physical or administrative access to potentially manipulate the AMD Generic Encapsulated Software Architecture (AGESA) to execute arbitrary code undetected by the operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2021

CVE-2021-43815

Publication date:
10/12/2021
Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2021-4089

Publication date:
10/12/2021
snipe-it is vulnerable to Improper Access Control
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022

CVE-2021-23561

Publication date:
10/12/2021
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021