Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-20039

Publication date:
08/12/2021
Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2025

CVE-2021-20040

Publication date:
08/12/2021
A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-20038

Publication date:
08/12/2021
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2018-25020

Publication date:
08/12/2021
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
Severity CVSS v4.0: Pending analysis
Last modification:
05/04/2022

CVE-2020-22421

Publication date:
08/12/2021
74CMS v6.0.4 was discovered to contain a cross-site scripting (XSS) vulnerability via /index.php?m=&c=help&a=help_list&key.
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2021

CVE-2021-44725

Publication date:
08/12/2021
KNIME Server before 4.13.4 allows directory traversal in a request for a client profile.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2021-3370

Publication date:
08/12/2021
DouPHP v1.6 was discovered to contain a cross-site scripting (XSS) vulnerability via /admin/cloud.php.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2021

CVE-2021-41311

Publication date:
08/12/2021
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2021-41309

Publication date:
08/12/2021
Affected versions of Atlassian Jira Server and Data Center allow a user who has had their Jira Service Management access revoked to export audit logs of another user's Jira Service Management project via a Broken Authentication vulnerability in the /plugins/servlet/audit/resource endpoint. The affected versions of Jira Server and Data Center are before version 8.19.1.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2021-44726

Publication date:
08/12/2021
KNIME Server before 4.13.4 allows XSS via the old WebPortal login page.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2021-44420

Publication date:
08/12/2021
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-43808

Publication date:
08/12/2021
Laravel is a web application framework. Laravel prior to versions 8.75.0, 7.30.6, and 6.20.42 contain a possible cross-site scripting (XSS) vulnerability in the Blade templating engine. A broken HTML element may be clicked and the user taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched in versions 8.75.0, 7.30.6, and 6.20.42 by determining the parent placeholder at runtime and using a random hash that is unique to each request.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022