Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-42360

Publication date:
17/11/2021
On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2021

CVE-2021-42362

Publication date:
17/11/2021
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2021-33479

Publication date:
17/11/2021
A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2024

CVE-2021-33480

Publication date:
17/11/2021
An use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2024

CVE-2021-43975

Publication date:
17/11/2021
In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-43976

Publication date:
17/11/2021
In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2024

CVE-2021-43977

Publication date:
17/11/2021
SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-32234

Publication date:
17/11/2021
SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2021-40745

Publication date:
17/11/2021
Adobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2021-42250

Publication date:
17/11/2021
Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2021-29861

Publication date:
17/11/2021
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in EFS to expose sensitive information. IBM X-Force ID: 206085.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2021

CVE-2021-38959

Publication date:
17/11/2021
IBM SPSS Statistics for Windows 24.0, 25.0, 26.0, 27.0, 27.0.1, and 28.0 could allow a local user to cause a denial of service by writing arbitrary files to admin protected directories on the system. IBM X-Force ID: 212046.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2021