Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37345

Publication date:
13/08/2021
Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because xi-sys.cfg is being imported from the var directory for some scripts with elevated permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-37348

Publication date:
13/08/2021
Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-37350

Publication date:
13/08/2021
Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitisation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-37351

Publication date:
13/08/2021
Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-37352

Publication date:
13/08/2021
An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-37344

Publication date:
13/08/2021
Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection).
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-37346

Publication date:
13/08/2021
Nagios XI WatchGuard Wizard before version 1.4.8 is vulnerable to remote code execution through Improper neutralisation of special elements used in an OS Command (OS Command injection).
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-37353

Publication date:
13/08/2021
Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-37343

Publication date:
13/08/2021
A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2022

CVE-2021-37695

Publication date:
13/08/2021
ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37690

Publication date:
13/08/2021
TensorFlow is an end-to-end open source platform for machine learning. In affected versions when running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. `ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types. We have patched the issue in GitHub commit ee119d4a498979525046fba1c3dd3f13a039fbb1. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2021

CVE-2021-38603

Publication date:
12/08/2021
PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021