Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-39239

Publication date:
16/09/2021
A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-41079

Publication date:
16/09/2021
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-34798

Publication date:
16/09/2021
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-39275

Publication date:
16/09/2021
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2021-36160

Publication date:
16/09/2021
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2021-40438

Publication date:
16/09/2021
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2021-27340

Publication date:
16/09/2021
OpenSIS Community Edition version
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-27341

Publication date:
16/09/2021
OpenSIS Community Edition version
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-34572

Publication date:
16/09/2021
Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2020-14119

Publication date:
16/09/2021
There is command injection in the addMeshNode interface of xqnetwork.lua, which leads to command execution under administrator authority on Xiaomi router AX3600 with rom versionrom
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2020-14124

Publication date:
16/09/2021
There is a buffer overflow in librsa.so called by getwifipwdurl interface, resulting in code execution on Xiaomi router AX3600 with ROM version =rom
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-34576

Publication date:
16/09/2021
In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021