Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-38556

Publication date:
24/08/2021
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2021-37538

Publication date:
24/08/2021
Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-38613

Publication date:
24/08/2021
The assets/index.php Image Upload feature of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to upload any code to the target system and achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2021

CVE-2021-36385

Publication date:
24/08/2021
A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-38611

Publication date:
24/08/2021
A command-injection vulnerability in the Image Upload function of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to execute arbitrary commands, as root, via shell metacharacters in the filename parameter to assets/index.php.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-38612

Publication date:
24/08/2021
In NASCENT RemKon Device Manager 4.0.0.0, a Directory Traversal vulnerability in a log-reading function in maintenance/readLog.php allows an attacker to read any file via a specialized URL.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-33191

Publication date:
24/08/2021
From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an "agent-update" command which was designed to patch the application binary. This "patching" command defaults to calling a trusted binary, but might be modified to an arbitrary value through a "c2-update" command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-23432

Publication date:
24/08/2021
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-23430

Publication date:
24/08/2021
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-23431

Publication date:
24/08/2021
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-23429

Publication date:
24/08/2021
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2021

CVE-2021-23406

Publication date:
24/08/2021
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2021