Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-44031

Publication date:
22/12/2021
An issue was discovered in Quest KACE Desktop Authority before 11.2. /dacomponentui/profiles/profileitems/outlooksettings/Insertimage.aspx contains a vulnerability that could allow pre-authentication remote code execution. An attacker could upload a .ASP file to reside at /images/{GUID}/{filename}.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2021

CVE-2021-44028

Publication date:
22/12/2021
XXE can occur in Quest KACE Desktop Authority before 11.2 because the log4net configuration file might be controlled by an attacker, a related issue to CVE-2018-1285.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2022

CVE-2021-43851

Publication date:
22/12/2021
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. SQL injection vulnerability exist in multiple files in Time Tracker version 1.19.33.5606 and prior due to not properly checking of the "group" and "status" parameters in POST requests. Group parameter is posted along when navigating between organizational subgroups (groups.php file). Status parameter is used in multiple files to change a status of an entity such as making a project, task, or user inactive. This issue has been patched in version 1.19.33.5607. An upgrade is highly recommended. If an upgrade is not practical, introduce ttValidStatus function as in the latest version and start using it user input check blocks wherever status field is used. For groups.php fix, introduce ttValidInteger function as in the latest version and use it in the access check block in the file.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2021

CVE-2021-44919

Publication date:
21/12/2021
A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function in gpac 1.1.0-DEV, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2022

CVE-2021-44926

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in the gf_node_get_tag function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2022

CVE-2021-44922

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-44921

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-44923

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2021-44924

Publication date:
21/12/2021
An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-44925

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-44927

Publication date:
21/12/2021
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-44920

Publication date:
21/12/2021
An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021