Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-0483

Publication date:
22/10/2021
In multiple methods of AAudioService, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-153358911
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2021

CVE-2021-0651

Publication date:
22/10/2021
In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-41745

Publication date:
22/10/2021
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-38481

Publication date:
22/10/2021
The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-41744

Publication date:
22/10/2021
All versions of yongyou PLM are affected by a command injection issue. UFIDA PLM (Product Life Cycle Management) is a strategic management method. It applies a series of enterprise application systems to support the entire process from conceptual design to the end of product life, and the collaborative creation, distribution, application and management of product information across organizations. Yonyou PLM uses jboss by default, and you can access the management control background without authorization An attacker can use this vulnerability to gain server permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-41747

Publication date:
22/10/2021
Cross-Site Scripting (XSS) vulnerability exists in Csdn APP 4.10.0, which can be exploited by attackers to obtain sensitive information such as user cookies.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2021

CVE-2021-38473

Publication date:
22/10/2021
The affected product’s code base doesn’t properly control arguments for specific functions, which could lead to a stack overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2021-38469

Publication date:
22/10/2021
Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-38471

Publication date:
22/10/2021
There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2021-36357

Publication date:
22/10/2021
An issue was discovered in OpenPOWER 2.6 firmware. unpack_timestamp() calls le32_to_cpu() for endian conversion of a uint16_t "year" value, resulting in a type mismatch that can truncate a higher integer value to a smaller one, and bypass a timestamp check. The fix is to use the right endian conversion function.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-38453

Publication date:
22/10/2021
Some API functions allow interaction with the registry, which includes reading values as well as data modification.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021

CVE-2021-38477

Publication date:
22/10/2021
There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2021