Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-22948

Publication date:
23/09/2021
Vulnerability in the generation of session IDs in revive-adserver
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2021-22952

Publication date:
23/09/2021
A vulnerability found in UniFi Talk application V1.12.3 and earlier permits a malicious actor who has already gained access to a network to subsequently control Talk device(s) assigned to said network if they are not yet adopted. This vulnerability is fixed in UniFi Talk application V1.12.5 and later.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2022

CVE-2021-22941

Publication date:
23/09/2021
Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2021-22017

Publication date:
23/09/2021
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-22945

Publication date:
23/09/2021
When sending data to an MQTT server, libcurl
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025

CVE-2021-22015

Publication date:
23/09/2021
The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2021-22014

Publication date:
23/09/2021
The vCenter Server contains an authenticated code execution vulnerability in VAMI (Virtual Appliance Management Infrastructure). An authenticated VAMI user with network access to port 5480 on vCenter Server may exploit this issue to execute code on the underlying operating system that hosts vCenter Server.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-22013

Publication date:
23/09/2021
The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-22012

Publication date:
23/09/2021
The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-22011

Publication date:
23/09/2021
vCenter Server contains an unauthenticated API endpoint vulnerability in vCenter Server Content Library. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to perform unauthenticated VM network setting manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-22010

Publication date:
23/09/2021
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-22006

Publication date:
23/09/2021
The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021