Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-20044

Publication date:
08/12/2021
A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-20043

Publication date:
08/12/2021
A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-20041

Publication date:
08/12/2021
An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-20042

Publication date:
08/12/2021
An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2021-20039

Publication date:
08/12/2021
Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2025

CVE-2021-20040

Publication date:
08/12/2021
A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-20038

Publication date:
08/12/2021
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2018-25020

Publication date:
08/12/2021
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
Severity CVSS v4.0: Pending analysis
Last modification:
05/04/2022

CVE-2020-22421

Publication date:
08/12/2021
74CMS v6.0.4 was discovered to contain a cross-site scripting (XSS) vulnerability via /index.php?m=&c=help&a=help_list&key.
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2021

CVE-2021-44725

Publication date:
08/12/2021
KNIME Server before 4.13.4 allows directory traversal in a request for a client profile.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2021-3370

Publication date:
08/12/2021
DouPHP v1.6 was discovered to contain a cross-site scripting (XSS) vulnerability via /admin/cloud.php.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2021

CVE-2021-41311

Publication date:
08/12/2021
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024