Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-40172

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40176

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5225 allows stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40177

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40173

Publication date:
29/08/2021
Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40174

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40175

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40178

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-38154

Publication date:
29/08/2021
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2021-39174

Publication date:
28/08/2021
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2023

CVE-2021-39172

Publication date:
27/08/2021
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2021-39173

Publication date:
27/08/2021
Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2022

CVE-2021-39171

Publication date:
27/08/2021
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2021