Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-42556

Publication date:
22/10/2021
Rasa X before 0.42.4 allows Directory Traversal during archive extraction. In the functionality that allows a user to load a trained model archive, an attacker has arbitrary write capability within specific directories via a crafted archive file.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-42840

Publication date:
22/10/2021
SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-29835

Publication date:
22/10/2021
IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204833.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2021

CVE-2021-41171

Publication date:
22/10/2021
eLabFTW is an open source electronic lab notebook manager for research teams. In versions of eLabFTW before 4.1.0, it allows attackers to bypass a brute-force protection mechanism by using many different forged PHPSESSID values in HTTP Cookie header. This issue has been addressed by implementing brute force login protection, as recommended by Owasp with Device Cookies. This mechanism will not impact users and will effectively thwart any brute-force attempts at guessing passwords. The only correct way to address this is to upgrade to version 4.1.0. Adding rate limitation upstream of the eLabFTW service is of course a valid option, with or without upgrading.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-42836

Publication date:
22/10/2021
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2021-0708

Publication date:
22/10/2021
In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2021

CVE-2021-0703

Publication date:
22/10/2021
In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2021

CVE-2021-0702

Publication date:
22/10/2021
In RevertActiveSessions of apexd.cpp, there is a possible way to share the wrong file due to an unintentional MediaStore downgrade. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-193932765
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2021

CVE-2021-30359

Publication date:
22/10/2021
The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-38485

Publication date:
22/10/2021
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42534

Publication date:
22/10/2021
The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-42536

Publication date:
22/10/2021
The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021