Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-3163

Publication date:
12/04/2021
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2021-21394

Publication date:
12/04/2021
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. Note that the groups feature is not part of the Matrix specification and the chosen maximum lengths are arbitrary. Not all clients might abide by them. Refer to referenced GitHub security advisory for additional details including workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-21524

Publication date:
12/04/2021
Dell SRM versions prior to 4.5.0.1 and Dell SMR versions prior to 4.5.0.1 contain an Untrusted Deserialization Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability, leading to arbitrary privileged code execution on the vulnerable application. The severity is Critical as this may lead to system compromise by unauthenticated attackers.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2021

CVE-2019-15059

Publication date:
12/04/2021
In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2021

CVE-2021-21545

Publication date:
12/04/2021
Dell Peripheral Manager 1.3.1 or greater contains remediation for a local privilege escalation vulnerability that could be potentially exploited to gain arbitrary code execution on the system with privileges of the system user.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2021

CVE-2021-3128

Publication date:
12/04/2021
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2021

CVE-2021-3125

Publication date:
12/04/2021
In TP-Link TL-XDR3230
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2021

CVE-2021-29302

Publication date:
12/04/2021
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-29357

Publication date:
12/04/2021
The ECT Provider component in OutSystems Platform Server 10 before 10.0.1104.0 and 11 before 11.9.0 (and LifeTime management console before 11.7.0) allows SSRF for arbitrary outbound HTTP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2021

CVE-2021-23270

Publication date:
12/04/2021
In Gargoyle OS 1.12.0, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2021

CVE-2020-15390

Publication date:
12/04/2021
pyActivity in Pega Platform 8.4.0.237 has a security misconfiguration that leads to an improper access control vulnerability via =GetWebInfo.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2021

CVE-2021-20519

Publication date:
12/04/2021
IBM Jazz Team Server products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198441.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2021