Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-30359

Publication date:
22/10/2021
The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-38485

Publication date:
22/10/2021
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42534

Publication date:
22/10/2021
The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42536

Publication date:
22/10/2021
The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42542

Publication date:
22/10/2021
The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42539

Publication date:
22/10/2021
The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42540

Publication date:
22/10/2021
The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-0705

Publication date:
22/10/2021
In sanitizeSbn of NotificationManagerService.java, there is a possible way to keep service running in foreground and keep granted permissions due to Bypass of Background Service Restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-185388103
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-0706

Publication date:
22/10/2021
In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-0652

Publication date:
22/10/2021
In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-42538

Publication date:
22/10/2021
The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2021-0870

Publication date:
22/10/2021
In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2021