Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37598

Publication date:
19/08/2021
WP Cerber before 8.9.3 allows bypass of /wp-json access control via a trailing ? character.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-37597

Publication date:
19/08/2021
WP Cerber before 8.9.3 allows MFA bypass via wordpress_logged_in_[hash] manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-28490

Publication date:
19/08/2021
In OWASP CSRFGuard through 3.1.0, CSRF can occur because the CSRF cookie may be retrieved by using only a session token.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2021

CVE-2021-39302

Publication date:
19/08/2021
MISP 2.4.148, in certain configurations, allows SQL injection via the app/Model/Log.php $conditions['org'] value.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2020-18748

Publication date:
19/08/2021
Cross Site Scripting (XSS) in Typora v0.9.65 allows attackers to execute arbitrary code via mathjax syntax due to a mathjax configuration error in the mathematical formula blocks. This is a different vulnerability from CVE-2020-18221.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2021

CVE-2021-31868

Publication date:
19/08/2021
Rapid7 Nexpose version 6.6.95 and earlier allows authenticated users of the Security Console to view and edit any ticket in the legacy ticketing feature, regardless of the assignment of the ticket. This issue was resolved in version 6.6.96, released on August 4, 2021.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2021

CVE-2021-34645

Publication date:
19/08/2021
The Shopping Cart & eCommerce Store WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_currency_settings function found in the ~/admin/inc/wp_easycart_admin_initial_setup.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2021

CVE-2021-31338

Publication date:
19/08/2021
A vulnerability has been identified in SINEMA Remote Connect Client (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2021

CVE-2021-29280

Publication date:
19/08/2021
In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2021

CVE-2021-24038

Publication date:
19/08/2021
Due to a bug with management of handles in OVRServiceLauncher.exe, an attacker could expose a privileged process handle to an unprivileged process, leading to local privilege escalation. This issue affects Oculus Desktop versions after 1.39 and prior to 31.1.0.67.507.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2021

CVE-2021-39138

Publication date:
19/08/2021
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Developers can use the REST API to signup users and also allow users to login anonymously. Prior to version 4.5.1, when an anonymous user is first signed up using REST, the server creates session incorrectly. Particularly, the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password. If a developer later depends on the `createdWith` field to provide a different level of access between a password user and anonymous user, the server incorrectly classified the session type as being created with a `password`. The server does not currently use `createdWith` to make decisions about internal functions, so if a developer is not using `createdWith` directly, they are not affected. The vulnerability only affects users who depend on `createdWith` by using it directly. The issue is patched in Parse Server version 4.5.1. As a workaround, do not use the `createdWith` Session field to make decisions if one allows anonymous login.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-37698

Publication date:
19/08/2021
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025