Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-27208

Publication date:
15/03/2021
When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand’s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification of the board assembly on which the Zynq-7000 SoC device mounted is needed to replace the original NAND flash memory with a NAND flash emulation device for this attack to be successful.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2021

CVE-2020-35358

Publication date:
15/03/2021
DomainMOD domainmod-v4.15.0 is affected by an insufficient session expiration vulnerability. On changing a password, both sessions using the changed password and old sessions in any other browser or device do not expire and remain active. Such flaws frequently give attackers unauthorized access to some system data or functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-27576

Publication date:
15/03/2021
If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2021

CVE-2021-28379

Publication date:
15/03/2021
web/upload/UploadHandler.php in Vesta Control Panel (aka VestaCP) through 0.9.8-27 and myVesta through 0.9.8-26-39 allows uploads from a different origin.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021

CVE-2021-28378

Publication date:
15/03/2021
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021

CVE-2021-28375

Publication date:
15/03/2021
An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-28374

Publication date:
15/03/2021
The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash).
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-28373

Publication date:
13/03/2021
The auth_internal plugin in Tiny Tiny RSS (aka tt-rss) before 2021-03-12 allows an attacker to log in via the OTP code without a valid password. NOTE: this issue only affected the git master branch for a short time. However, all end users are explicitly directed to use the git master branch in production. Semantic version numbers such as 21.03 appear to exist, but are automatically generated from the year and month. They are not releases.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-28361

Publication date:
13/03/2021
An issue was discovered in Storage Performance Development Kit (SPDK) before 20.01.01. If a PDU is sent to the iSCSI target with a zero length (but data is expected), the iSCSI target can crash with a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2020-35682

Publication date:
13/03/2021
Zoho ManageEngine ServiceDesk Plus before 11134 allows an Authentication Bypass (only during SAML login).
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2021

CVE-2021-20017

Publication date:
13/03/2021
A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021

CVE-2021-20018

Publication date:
13/03/2021
A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2021