Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-28471

Publication date:
13/04/2021
Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28470

Publication date:
13/04/2021
Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-29427

Publication date:
13/04/2021
In Gradle from version 5.1 and before version 7.0 there is a vulnerability which can lead to information disclosure and/or dependency poisoning. Repository content filtering is a security control Gradle introduced to help users specify what repositories are used to resolve specific dependencies. This feature was introduced in the wake of the "A Confusing Dependency" blog post. In some cases, Gradle may ignore content filters and search all repositories for dependencies. This only occurs when repository content filtering is used from within a `pluginManagement` block in a settings file. This may change how dependencies are resolved for Gradle plugins and build scripts. For builds that are vulnerable, there are two risks: 1) Information disclosure: Gradle could make dependency requests to repositories outside your organization and leak internal package identifiers. 2) Dependency poisoning/Dependency confusion: Gradle could download a malicious binary from a repository outside your organization due to name squatting. For a full example and more details refer to the referenced GitHub Security Advisory. The problem has been patched and released with Gradle 7.0. Users relying on this feature should upgrade their build as soon as possible. As a workaround, users may use a company repository which has the right rules for fetching packages from public repositories, or use project level repository content filtering, inside `buildscript.repositories`. This option is available since Gradle 5.1 when the feature was introduced.
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2021

CVE-2021-29428

Publication date:
13/04/2021
In Gradle before version 7.0, on Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory. This vulnerability impacted builds using precompiled script plugins written in Kotlin DSL and tests for Gradle plugins written using ProjectBuilder or TestKit. If you are on Windows or modern versions of macOS, you are not vulnerable. If you are on a Unix-like operating system with the "sticky" bit set on your system temporary directory, you are not vulnerable. The problem has been patched and released with Gradle 7.0. As a workaround, on Unix-like operating systems, ensure that the "sticky" bit is set. This only allows the original user (or root) to delete a file. If you are unable to change the permissions of the system temporary directory, you can move the Java temporary directory by setting the System Property `java.io.tmpdir`. The new path needs to limit permissions to the build user only. For additional details refer to the referenced GitHub Security Advisory.
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2021

CVE-2021-28459

Publication date:
13/04/2021
Azure DevOps Server Spoofing Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28457

Publication date:
13/04/2021
Visual Studio Code Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28456

Publication date:
13/04/2021
Microsoft Excel Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28454

Publication date:
13/04/2021
Microsoft Excel Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28449

Publication date:
13/04/2021
Microsoft Office Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28448

Publication date:
13/04/2021
Visual Studio Code Kubernetes Tools Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28450

Publication date:
13/04/2021
Microsoft SharePoint Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2021-28451

Publication date:
13/04/2021
Microsoft Excel Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023