Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-21991

Publication date:
22/09/2021
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-21992

Publication date:
22/09/2021
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service condition on the vCenter Server host.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-34647

Publication date:
22/09/2021
The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to export all Ninja Forms submissions data via the /ninja-forms-submissions/export REST API which can include personally identifiable information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2021-34648

Publication date:
22/09/2021
The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send arbitrary emails from the affected server via the /ninja-forms-submissions/email-action REST API which can be used to socially engineer victims.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2021-40684

Publication date:
22/09/2021
Talend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-37860

Publication date:
22/09/2021
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2021

CVE-2019-6288

Publication date:
22/09/2021
Edgecore ECS2020 Firmware 1.0.0.0 devices allow Unauthenticated Command Injection via the command1 HTTP header to the /EXCU_SHELL URI.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2021

CVE-2021-41011

Publication date:
22/09/2021
LINE client for iOS before 11.15.0 might expose authentication information for a certain service to external entities under certain conditions. This is usually impossible, but in combination with a server-side bug, attackers could get this information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-40875

Publication date:
22/09/2021
Improper Access Control in Gurock TestRail versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-37927

Publication date:
22/09/2021
Zoho ManageEngine ADManager Plus version 7110 and prior allows account takeover via SSO.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-31836

Publication date:
22/09/2021
Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2021-31841

Publication date:
22/09/2021
A DLL sideloading vulnerability in McAfee Agent for Windows prior to 5.7.4 could allow a local user to perform a DLL sideloading attack with an unsigned DLL with a specific name and in a specific location. This would result in the user gaining elevated permissions and the ability to execute arbitrary code as the system user, through not checking the DLL signature.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023