Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-28940

Publication date:
02/04/2021
Because of a incorrect escaped exec command in MagpieRSS in 0.72 in the /extlib/Snoopy.class.inc file, it is possible to add a extra command to the curl binary. This creates an issue on the /scripts/magpie_debug.php and /scripts/magpie_simple.php page that if you send a specific https url in the RSS URL field, you are able to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2020-21588

Publication date:
02/04/2021
Buffer overflow in Core FTP LE v2.2 allows local attackers to cause a denial or service (crash) via a long string in the Setup->Users->Username editbox.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2020-21585

Publication date:
02/04/2021
Vulnerability in emlog v6.0.0 allows user to upload webshells via zip plugin module.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2020-21590

Publication date:
02/04/2021
Directory traversal in coreframe/app/template/admin/index.php in WUZHI CMS 4.1.0 allows attackers to list files in arbitrary directories via the dir parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-3374

Publication date:
02/04/2021
Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-29661

Publication date:
02/04/2021
Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-27973

Publication date:
02/04/2021
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2021

CVE-2021-1805

Publication date:
02/04/2021
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2021

CVE-2021-1806

Publication date:
02/04/2021
A race condition was addressed with additional validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2021

CVE-2021-1870

Publication date:
02/04/2021
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2021-1818

Publication date:
02/04/2021
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-29660

Publication date:
02/04/2021
A Cross-Site Request Forgery (CSRF) vulnerability in en/cfg_setpwd.html in Softing AG OPC Toolbox through 4.10.1.13035 allows attackers to reset the administrative password by inducing the Administrator user to browse a URL controlled by an attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021