Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-25443

Publication date:
05/08/2021
A use after free vulnerability in conn_gadget driver prior to SMR AUG-2021 Release 1 allows malicious action by an attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-32578

Publication date:
05/08/2021
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-32576

Publication date:
05/08/2021
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-29978

Publication date:
05/08/2021
Multiple low security issues were discovered and fixed in a security audit of Mozilla VPN 2.x branch as part of a 3rd party security audit. This vulnerability affects Mozilla VPN
Severity CVSS v4.0: Pending analysis
Last modification:
13/08/2021

CVE-2021-25448

Publication date:
05/08/2021
Improper access control vulnerability in Smart Touch Call prior to version 1.0.0.5 allows arbitrary webpage loading in webview.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2022

CVE-2021-25447

Publication date:
05/08/2021
Improper access control vulnerability in SmartThings prior to version 1.7.67.25 allows untrusted applications to cause local file inclusion in webview.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2022

CVE-2021-25446

Publication date:
05/08/2021
Improper access control vulnerability in SmartThings prior to version 1.7.67.25 allows untrusted applications to cause arbitrary webpage loading in webview.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2022

CVE-2021-25444

Publication date:
05/08/2021
An IV reuse vulnerability in keymaster prior to SMR AUG-2021 Release 1 allows decryption of custom keyblob with privileged process.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2021-22241

Publication date:
05/08/2021
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0. It was possible to exploit a stored cross-site-scripting via a specifically crafted default branch name.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-22240

Publication date:
05/08/2021
Improper access control in GitLab EE versions 13.11.6, 13.12.6, and 14.0.2 allows users to be created via single sign on despite user cap being enabled
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-21739

Publication date:
05/08/2021
A ZTE's product of the transport network access layer has a security vulnerability. Because the system does not sufficiently verify the data reliability, attackers could replace an authenticated optical module on the equipment with an unauthenticated one, bypassing system authentication and detection, thus affecting signal transmission. This affects:
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2021-21738

Publication date:
05/08/2021
ZTE's big video business platform has two reflective cross-site scripting (XSS) vulnerabilities. Due to insufficient input verification, the attacker could implement XSS attacks by tampering with the parameters, to affect the operations of valid users. This affects:
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021