Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-40146

Publication date:
11/09/2021
A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-38555

Publication date:
11/09/2021
An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-39207

Publication date:
10/09/2021
parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-24040

Publication date:
10/09/2021
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2021

CVE-2021-40347

Publication date:
10/09/2021
An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2021

CVE-2021-40864

Publication date:
10/09/2021
The Translate plugin 6.1.x through 6.3.x before 6.3.0.72 for ONLYOFFICE Document Server lacks escape calls for the msg.data and text fields.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2021

CVE-2021-3145

Publication date:
10/09/2021
In Ionic Identity Vault before 5, a local root attacker on an Android device can bypass biometric authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2021

CVE-2021-3646

Publication date:
10/09/2021
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2021

CVE-2021-37422

Publication date:
10/09/2021
Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to SQL Injection while linking the databases.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2021

CVE-2021-37423

Publication date:
10/09/2021
Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to linked applications takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2021

CVE-2021-37418

Publication date:
10/09/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-31874. Reason: This candidate is a reservation duplicate of CVE-2021-31874. Notes: All CVE users should reference CVE-2021-31874 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37414

Publication date:
10/09/2021
Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2021