Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-38188

Publication date:
08/08/2021
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2021

CVE-2021-38191

Publication date:
08/08/2021
An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2022

CVE-2021-36221

Publication date:
08/08/2021
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-36458

Publication date:
08/08/2021
An issue was discovered in the lexer crate through 2020-11-10 for Rust. For ReaderResult, there is an implementation of Sync with a trait bound of T: Send, E: Send.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2020-36437

Publication date:
08/08/2021
An issue was discovered in the conqueue crate before 0.4.0 for Rust. There are unconditional implementations of Send and Sync for QueueSender.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36438

Publication date:
08/08/2021
An issue was discovered in the tiny_future crate before 0.4.0 for Rust. Future does not have bounds on its Send and Sync traits.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36439

Publication date:
08/08/2021
An issue was discovered in the ticketed_lock crate before 0.3.0 for Rust. There are unconditional implementations of Send for ReadTicket and WriteTicket.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36440

Publication date:
08/08/2021
An issue was discovered in the libsbc crate before 0.1.5 for Rust. For Decoder, it implements Send for any R: Read.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36441

Publication date:
08/08/2021
An issue was discovered in the abox crate before 0.4.1 for Rust. It implements Send and Sync for AtomicBox with no requirement for T: Send and T: Sync.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36442

Publication date:
08/08/2021
An issue was discovered in the beef crate before 0.5.0 for Rust. beef::Cow has no Sync bound on its Send trait.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36444

Publication date:
08/08/2021
An issue was discovered in the async-coap crate through 2020-12-08 for Rust. Send and Sync are implemented for ArcGuard without trait bounds on RC.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-36445

Publication date:
08/08/2021
An issue was discovered in the convec crate through 2020-11-24 for Rust. There are unconditional implementations of Send and Sync for ConVec.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022