Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-21264

Publication date:
03/05/2021
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. A bypass of CVE-2020-26231 (fixed in 1.0.470/471 and 1.1.1) was discovered that has the same impact as CVE-2020-26231 & CVE-2020-15247. An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 472 (v1.0.472) and v1.1.2. As a workaround, apply https://github.com/octobercms/october/commit/f63519ff1e8d375df30deba63156a2fc97aa9ee7 to your installation manually if unable to upgrade to Build 472 or v1.1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2022

CVE-2021-29238

Publication date:
03/05/2021
CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF).
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-29239

Publication date:
03/05/2021
CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2021

CVE-2021-29241

Publication date:
03/05/2021
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2022

CVE-2021-29242

Publication date:
03/05/2021
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2021

CVE-2021-25631

Publication date:
03/05/2021
In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2021

CVE-2021-29369

Publication date:
03/05/2021
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-28860

Publication date:
03/05/2021
In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2021-31996

Publication date:
03/05/2021
An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. There is a double free in merge_sort::merge().
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2021

CVE-2021-28359

Publication date:
02/05/2021
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-31792

Publication date:
30/04/2021
XSS in the client account page in SuiteCRM before 7.11.19 allows an attacker to inject JavaScript via the name field
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2021

CVE-2021-31935

Publication date:
30/04/2021
OX App Suite 7.10.4 and earlier allows XSS via a crafted distribution list (payload in the common name) that is mishandled in the scheduling view.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2021