Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-36983

Publication date:
30/07/2021
replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2021

CVE-2021-37144

Publication date:
30/07/2021
CSZ CMS 1.2.9 is vulnerable to Arbitrary File Deletion. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37596

Publication date:
30/07/2021
Telegram Web K Alpha 0.6.1 allows XSS via a document name.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37594

Publication date:
30/07/2021
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37595

Publication date:
30/07/2021
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37600

Publication date:
30/07/2021
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-36621

Publication date:
30/07/2021
Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2021

CVE-2021-36624

Publication date:
30/07/2021
Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2021

CVE-2021-36386

Publication date:
30/07/2021
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37588

Publication date:
30/07/2021
In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-35478

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-35479

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Stored XSS in the custom column view for the alert history and audit log function through the affected pp parameter. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022