Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37600

Publication date:
30/07/2021
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-36621

Publication date:
30/07/2021
Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2021

CVE-2021-36624

Publication date:
30/07/2021
Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2021

CVE-2021-36386

Publication date:
30/07/2021
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37588

Publication date:
30/07/2021
In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-35478

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-35479

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Stored XSS in the custom column view for the alert history and audit log function through the affected pp parameter. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-34166

Publication date:
30/07/2021
A SQL INJECTION vulnerability in Sourcecodester Simple Food Website 1.0 allows a remote attacker to Bypass Authentication and become Admin.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2021-34165

Publication date:
30/07/2021
A SQL Injection vulnerability in Sourcecodester Basic Shopping Cart 1.0 allows a remote attacker to Bypass Authentication and become Admin.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2021

CVE-2021-34802

Publication date:
30/07/2021
A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 and 4.3 could allow authenticated users to execute commands with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2021

CVE-2021-36004

Publication date:
30/07/2021
Adobe InDesign version 16.0 (and earlier) is affected by an Out-of-bounds Write vulnerability in the CoolType library. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2021

CVE-2021-35472

Publication date:
30/07/2021
An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2021