Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-36624

Publication date:
30/07/2021
Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2021

CVE-2021-36386

Publication date:
30/07/2021
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-36605

Publication date:
30/07/2021
engineercms 1.03 is vulnerable to Cross Site Scripting (XSS). There is no escaping in the nickname field on the user list page. When viewing this page, the JavaScript code will be executed in the user's browser.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2021

CVE-2021-36754

Publication date:
30/07/2021
PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2021

CVE-2021-36983

Publication date:
30/07/2021
replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2021

CVE-2021-37144

Publication date:
30/07/2021
CSZ CMS 1.2.9 is vulnerable to Arbitrary File Deletion. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37596

Publication date:
30/07/2021
Telegram Web K Alpha 0.6.1 allows XSS via a document name.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37594

Publication date:
30/07/2021
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37595

Publication date:
30/07/2021
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2021

CVE-2021-37593

Publication date:
30/07/2021
PEEL Shopping version 9.4.0 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands. Upon a successful SQL injection attack, an attacker can read sensitive data from the database and possibly modify database data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2021

CVE-2021-36766

Publication date:
30/07/2021
Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-37587

Publication date:
30/07/2021
In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022