Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37750

Publication date:
23/08/2021
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-38598

Publication date:
23/08/2021
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2020-36477

Publication date:
23/08/2021
An issue was discovered in Mbed TLS before 2.24.0. The verification of X.509 certificates when matching the expected common name (the cn argument of mbedtls_x509_crt_verify) with the actual certificate name is mishandled: when the subjecAltName extension is present, the expected name is compared to any name in that extension regardless of its type. This means that an attacker could impersonate a 4-byte or 16-byte domain by getting a certificate for the corresponding IPv4 or IPv6 address (this would require the attacker to control that IP address, though).
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2020-36478

Publication date:
23/08/2021
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2023

CVE-2020-36475

Publication date:
23/08/2021
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2023

CVE-2020-36476

Publication date:
23/08/2021
An issue was discovered in Mbed TLS before 2.24.0 (and before 2.16.8 LTS and before 2.7.17 LTS). There is missing zeroization of plaintext buffers in mbedtls_ssl_read to erase unused application data from memory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2023

CVE-2021-39371

Publication date:
23/08/2021
An XML external entity (XXE) injection in PyWPS before 4.4.5 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2022

CVE-2021-39368

Publication date:
23/08/2021
Canon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2021

CVE-2021-39367

Publication date:
23/08/2021
Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-39365

Publication date:
22/08/2021
In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021

CVE-2021-39362

Publication date:
22/08/2021
An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2021

CVE-2021-39359

Publication date:
22/08/2021
In GNOME libgda through 6.0.0, gda-web-provider.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023