Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-32979

Publication date:
23/09/2021
Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2021

CVE-2021-32963

Publication date:
23/09/2021
Null pointer dereference in SuiteLink server while processing commands 0x03/0x10
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2021

CVE-2021-32971

Publication date:
23/09/2021
Null pointer dereference in SuiteLink server while processing command 0x07
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2021

CVE-2021-32959

Publication date:
23/09/2021
Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2021

CVE-2021-22953

Publication date:
23/09/2021
A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to clone topics which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security Research Team"
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2021

CVE-2021-22949

Publication date:
23/09/2021
A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security CMS Research Team"
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2021

CVE-2021-22017

Publication date:
23/09/2021
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2021-22945

Publication date:
23/09/2021
When sending data to an MQTT server, libcurl
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025

CVE-2021-22948

Publication date:
23/09/2021
Vulnerability in the generation of session IDs in revive-adserver
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2021-22016

Publication date:
23/09/2021
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-22020

Publication date:
23/09/2021
The vCenter Server contains a denial-of-service vulnerability in the Analytics service. Successful exploitation of this issue may allow an attacker to create a denial-of-service condition on vCenter Server.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2021

CVE-2021-22019

Publication date:
23/09/2021
The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2021