Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-30620

Publication date:
03/09/2021
Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-30621

Publication date:
03/09/2021
Chromium: CVE-2021-30621 UI Spoofing in Autofill
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-30622

Publication date:
03/09/2021
Chromium: CVE-2021-30622 Use after free in WebApp Installs
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-39193

Publication date:
03/09/2021
Frontier is Substrate's Ethereum compatibility layer. Prior to commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26, a bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. A patch is available in commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26. There are no workarounds aside from applying the patch.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2023

CVE-2021-40492

Publication date:
03/09/2021
A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibbon application that allows for arbitrary execution of JavaScript (gibbonCourseClassID, gibbonPersonID, subpage, currentDate, or allStudents to index.php).
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2021

CVE-2021-23437

Publication date:
03/09/2021
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2024

CVE-2021-39192

Publication date:
03/09/2021
Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2021

CVE-2021-39191

Publication date:
03/09/2021
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-40491

Publication date:
03/09/2021
The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2021-40494

Publication date:
03/09/2021
A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2021

CVE-2021-40490

Publication date:
03/09/2021
A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-26436

Publication date:
02/09/2021
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023