Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-36334

Publication date:
05/05/2021
themegrill-demo-importer before 1.6.3 allows CSRF, as demonstrated by wiping the database.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2020-36333

Publication date:
05/05/2021
themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2020-22428

Publication date:
05/05/2021
SolarWinds Serv-U before 15.1.6 Hotfix 3 is affected by Cross Site Scripting (XSS) via a directory name (entered by an admin) containing a JavaScript payload.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2021

CVE-2021-25179

Publication date:
05/05/2021
SolarWinds Serv-U before 15.2 is affected by Cross Site Scripting (XSS) via the HTTP Host header.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-26804

Publication date:
04/05/2021
Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by changing any file extension to ".gif", then uploading it in the "Administration/ Parameters/ Images" section of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-21999

Publication date:
04/05/2021
iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2020-4987

Publication date:
04/05/2021
The IBM FlashSystem 900 user management GUI is vulnerable to stored cross-site scripting in code versions 1.5.2.8 and prior and 1.6.1.2 and prior. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2022

CVE-2021-21551

Publication date:
04/05/2021
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2021-29477

Publication date:
04/05/2021
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the `STRALGO LCS` command.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-29478

Publication date:
04/05/2021
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-27518

Publication date:
04/05/2021
All versions of Windscribe VPN for Mac and Windows
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-3154

Publication date:
04/05/2021
An issue was discovered in SolarWinds Serv-U before 15.2.2. Unauthenticated attackers can retrieve cleartext passwords via macro Injection. NOTE: this had a distinct fix relative to CVE-2020-35481.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022