Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-25324

Publication date:
19/01/2021
MISP 2.4.136 has Stored XSS in the galaxy cluster view via a cluster name to app/View/GalaxyClusters/view.ctp.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2021

CVE-2020-4881

Publication date:
19/01/2021
IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the lack of server hostname verification for SSL/TLS communication. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 190851.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2021

CVE-2021-25323

Publication date:
19/01/2021
The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when changing a password.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2021

CVE-2021-22498

Publication date:
19/01/2021
XML External Entity Injection vulnerability in Micro Focus Application Lifecycle Management (Previously known as Quality Center) product. The vulnerability affects versions 12.x, 12.60 Patch 5 and earlier, 15.0.1 Patch 2 and earlier and 15.5. The vulnerability could be exploited to allow an XML External Entity Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-4873

Publication date:
19/01/2021
IBM Planning Analytics 2.0 could allow an attacker to obtain sensitive information due to an overly permissive CORS policy. IBM X-Force ID: 190836.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-4871

Publication date:
19/01/2021
IBM Planning Analytics 2.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 190834.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-27733

Publication date:
19/01/2021
Zoho ManageEngine Applications Manager before 14 build 14880 allows an authenticated SQL Injection via a crafted Alarmview request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2022

CVE-2020-28481

Publication date:
19/01/2021
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2021

CVE-2021-3182

Publication date:
19/01/2021
D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2021-3183

Publication date:
19/01/2021
Files.com Fat Client 3.3.6 allows authentication bypass because the client continues to have access after a logout and a removal of a login profile.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2021

CVE-2020-28482

Publication date:
19/01/2021
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-3181

Publication date:
19/01/2021
rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023