Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-27662

Publication date:
15/09/2021
The KT-1 door controller is susceptible to replay or man-in-the-middle attacks where an attacker can record and replay TCP packets. This issue affects Johnson Controls KT-1 all versions up to and including 3.01
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2020-3960

Publication date:
15/09/2021
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2021-41061

Publication date:
15/09/2021
In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-40444

Publication date:
15/09/2021
Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.<br /> An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br /> Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.<br /> Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.<br /> Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability.<br /> UPDATE September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2021-3785

Publication date:
15/09/2021
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;)
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-3783

Publication date:
15/09/2021
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;)
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-3780

Publication date:
15/09/2021
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;)
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-38669

Publication date:
15/09/2021
Microsoft Edge (Chromium-based) Tampering Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2021-40448

Publication date:
15/09/2021
Microsoft Accessibility Insights for Android Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2021-40447

Publication date:
15/09/2021
Windows Print Spooler Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2021-40440

Publication date:
15/09/2021
Microsoft Dynamics Business Central Cross-site Scripting Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2021-38671

Publication date:
15/09/2021
Windows Print Spooler Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023