Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-20142

Publication date:
09/12/2021
An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2021

CVE-2021-41449

Publication date:
09/12/2021
A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2021

CVE-2021-22565

Publication date:
09/12/2021
An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-3817

Publication date:
09/12/2021
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2021-36167

Publication date:
09/12/2021
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-43068

Publication date:
09/12/2021
A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-43071

Publication date:
09/12/2021
A heap-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the LogReport API controller.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-42759

Publication date:
09/12/2021
A violation of secure design principles in Fortinet Meru AP version 8.6.1 and below, version 8.5.5 and below allows attacker to execute unauthorized code or commands via crafted cli commands.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2021

CVE-2021-43065

Publication date:
09/12/2021
A incorrect permission assignment for critical resource in Fortinet FortiNAC version 9.2.0, version 9.1.3 and below, version 8.8.9 and below allows attacker to gain higher privileges via the access to sensitive system data.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2022

CVE-2021-36194

Publication date:
09/12/2021
Multiple stack-based buffer overflows in the API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an authenticated attacker to achieve arbitrary code execution via specially crafted requests.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-43204

Publication date:
09/12/2021
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-43410

Publication date:
09/12/2021
Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021