Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-45908

Publication date:
28/12/2021
An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2022

CVE-2021-45910

Publication date:
28/12/2021
An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2022

CVE-2021-45911

Publication date:
28/12/2021
An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow in the main function. It allows an attacker to write 2 bytes outside the boundaries of the buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2022

CVE-2021-45909

Publication date:
28/12/2021
An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2022

CVE-2020-21236

Publication date:
27/12/2021
A vulnerability in /damicms-master/admin.php?s=/Article/doedit of DamiCMS v6.0 allows attackers to compromise and impersonate user accounts via obtaining a user's session cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2022

CVE-2020-21238

Publication date:
27/12/2021
An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2022

CVE-2020-21237

Publication date:
27/12/2021
An issue in the user login box of LJCMS v1.11 allows attackers to hijack user accounts via brute force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2022

CVE-2021-45904

Publication date:
27/12/2021
OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2023

CVE-2021-45905

Publication date:
27/12/2021
OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2023

CVE-2021-45906

Publication date:
27/12/2021
OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2023

CVE-2021-45884

Publication date:
27/12/2021
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2022

CVE-2021-43858

Publication date:
27/12/2021
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022