Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-32012

Publication date:
19/07/2021
SheetJS and SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2022

CVE-2021-34817

Publication date:
19/07/2021
A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2021

CVE-2021-31216

Publication date:
19/07/2021
Siren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2021

CVE-2021-3279

Publication date:
19/07/2021
sz.chat version 4 allows injection of web scripts and HTML in the message box.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2021

CVE-2021-33501

Publication date:
19/07/2021
Overwolf Client 0.169.0.22 allows XSS, with resultant Remote Code Execution, via an overwolfstore:// URL.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2021

CVE-2021-33027

Publication date:
19/07/2021
Sylabs Singularity Enterprise through 1.6.2 has Insufficient Entropy in a nonce.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2021

CVE-2021-35967

Publication date:
19/07/2021
The directory page parameter of the Orca HCM digital learning platform does not filter special characters. Remote attackers can access the system directory thru Path Traversal without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2021

CVE-2021-35968

Publication date:
19/07/2021
The directory list page parameter of the Orca HCM digital learning platform fails to filter special characters properly. Remote attackers can access the system directory thru Path Traversal with users’ privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2021

CVE-2021-35963

Publication date:
19/07/2021
The specific parameter of upload function of the Orca HCM digital learning platform does not filter file format, which allows remote unauthenticated attackers to upload files containing malicious script to execute RCE attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2021

CVE-2021-35966

Publication date:
19/07/2021
The specific function of the Orca HCM digital learning platform does not filter input parameters properly, which causing the URL can be redirected to any website. Remote attackers can use the vulnerability to execute phishing attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2021

CVE-2021-35964

Publication date:
19/07/2021
The management page of the Orca HCM digital learning platform does not perform identity verification, which allows remote attackers to execute the management function without logging in, access members’ information, modify and delete the courses in system, thus causing users fail to access the learning content.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2021-35965

Publication date:
19/07/2021
The Orca HCM digital learning platform uses a weak factory default administrator password, which is hard-coded in the source code of the webpage in plain text, thus remote attackers can obtain administrator’s privilege without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022