Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-29478

Publication date:
04/05/2021
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-27518

Publication date:
04/05/2021
All versions of Windscribe VPN for Mac and Windows
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-3154

Publication date:
04/05/2021
An issue was discovered in SolarWinds Serv-U before 15.2.2. Unauthenticated attackers can retrieve cleartext passwords via macro Injection. NOTE: this had a distinct fix relative to CVE-2020-35481.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-22547

Publication date:
04/05/2021
In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2021

CVE-2021-29240

Publication date:
04/05/2021
The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-23343

Publication date:
04/05/2021
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-23383

Publication date:
04/05/2021
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-31164

Publication date:
04/05/2021
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-32020

Publication date:
03/05/2021
The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2021

CVE-2020-23015

Publication date:
03/05/2021
An open redirect issue was discovered in OPNsense through 20.1.5. The redirect parameter "url" in login page was not filtered and can redirect user to any website.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2020-23083

Publication date:
03/05/2021
Unrestricted File Upload in JEECG v4.0 and earlier allows remote attackers to execute arbitrary code or gain privileges by uploading a crafted file to the component "jeecgFormDemoController.do?commonUpload".
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2020-35755

Publication date:
03/05/2021
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service Read_ NVRAM Direct Access Information Leak. The luci_service deamon running on port 7777 provides a sub-category of commands for which Read_ is prepended. Commands in this category are able to directly read the contents of the device configuration NVRAM. The NVRAM contains sensitive information, such as the Wi-Fi password (in cleartext), as well as connected account tokens for services such as Spotify.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022