Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-4131

Publication date:
18/12/2021
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021

CVE-2021-4130

Publication date:
18/12/2021
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021

CVE-2021-41500

Publication date:
17/12/2021
Incomplete string comparison vulnerability exits in cvxopt.org cvxop
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-41497

Publication date:
17/12/2021
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41498

Publication date:
17/12/2021
Buffer overflow in ajaxsoundstudio.com Pyo &lt and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41499

Publication date:
17/12/2021
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41496

Publication date:
17/12/2021
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-23450

Publication date:
17/12/2021
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2021-23803

Publication date:
17/12/2021
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-23797

Publication date:
17/12/2021
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41495

Publication date:
17/12/2021
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-23814

Publication date:
17/12/2021
This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading.<br /> <br /> An attacker may be able to reproduce the following steps:<br /> <br /> 1. Install a package with a web Laravel application.<br /> 2. Navigate to the Upload window<br /> 3. Upload an image file, then capture the request<br /> 4. Edit the request contents with a malicious file (webshell)<br /> 5. Enter the path of file uploaded on URL - Remote Code Execution<br /> <br /> <br /> **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025