Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-38985

Publication date:
12/11/2021
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2020-4146

Publication date:
12/11/2021
IBM Security SiteProtector System 3.1.1 could allow a remote attacker to obtain sensitive information, caused by missing 'HttpOnly' flag. A remote attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 174129.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-38973

Publication date:
12/11/2021
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-38972

Publication date:
12/11/2021
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2020-4140

Publication date:
12/11/2021
IBM Security SiteProtector System 3.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174052.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-43493

Publication date:
12/11/2021
ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-43492

Publication date:
12/11/2021
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-43496

Publication date:
12/11/2021
Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-43494

Publication date:
12/11/2021
OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2021-3934

Publication date:
12/11/2021
ohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2021

CVE-2021-43578

Publication date:
12/11/2021
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2021-43577

Publication date:
12/11/2021
Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023