Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-3013

Publication date:
11/06/2021
ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2021

CVE-2021-34540

Publication date:
11/06/2021
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
21/06/2021

CVE-2021-26829

Publication date:
11/06/2021
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025

CVE-2021-26828

Publication date:
11/06/2021
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2021-28805

Publication date:
11/06/2021
Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2022

CVE-2021-28814

Publication date:
11/06/2021
An improper access control vulnerability has been reported to affect QNAP NAS. If exploited, this vulnerability allows remote attackers to compromise the security of the software. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2022

CVE-2021-28801

Publication date:
11/06/2021
An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2021

CVE-2021-24035

Publication date:
11/06/2021
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2025

CVE-2021-25683

Publication date:
11/06/2021
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2021

CVE-2021-25682

Publication date:
11/06/2021
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2022

CVE-2021-25684

Publication date:
11/06/2021
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-23393

Publication date:
11/06/2021
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2021