Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-23263

Publication date:
02/12/2021
Unauthenticated remote attackers can read textual content via FreeMarker including files /scripts/*, /templates/* and some of the files in /.git/* (non-binary).
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2022

CVE-2021-43679

Publication date:
02/12/2021
ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-43682

Publication date:
02/12/2021
thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-43681

Publication date:
02/12/2021
SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-43683

Publication date:
02/12/2021
pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-43686

Publication date:
02/12/2021
nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t'].
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-26777

Publication date:
02/12/2021
Buffer overflow vulnerability in function SetFirewall in index.cgi in CIRCUTOR COMPACT DC-S BASIC smart metering concentrator Firwmare version CIR_CDC_v1.2.17, allows attackers to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2021

CVE-2020-27414

Publication date:
02/12/2021
Mahavitaran android application 7.50 and prior transmit sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header, MITM or browser history.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-44227

Publication date:
02/12/2021
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2022

CVE-2021-43791

Publication date:
02/12/2021
Zulip is an open source group chat application that combines real-time chat with threaded conversations. In affected versions expiration dates on the confirmation objects associated with email invitations were not enforced properly in the new account registration flow. A confirmation link takes a user to the check_prereg_key_and_redirect endpoint, before getting redirected to POST to /accounts/register/. The problem was that validation was happening in the check_prereg_key_and_redirect part and not in /accounts/register/ - meaning that one could submit an expired confirmation key and be able to register. The issue is fixed in Zulip 4.8. There are no known workarounds and users are advised to upgrade as soon as possible.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2020-35012

Publication date:
01/12/2021
The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to an SQL Injection
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2020-35037

Publication date:
01/12/2021
The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape some search parameter before outputing them in pages, which could lead to Cross-Site Scripting issues
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024