Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-27945

Publication date:
08/04/2021
The Squirro Insights Engine was affected by a Reflected Cross-Site Scripting (XSS) vulnerability affecting versions 2.0.0 up to and including 3.2.4. An attacker can use the vulnerability to inject malicious JavaScript code into the application, which will execute within the browser of any user who views the relevant application content. The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, and logging their keystrokes.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2021

CVE-2021-27522

Publication date:
08/04/2021
Learnsite 1.2.5.0 contains a remote privilege escalation vulnerability in /Manager/index.aspx through the JudgIsAdmin() function. By modifying the initial letter of the key of a user cookie, the key of the administrator cookie can be obtained.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2020-8629

Publication date:
08/04/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8630

Publication date:
08/04/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8626

Publication date:
08/04/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8627

Publication date:
08/04/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8628

Publication date:
08/04/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-23426

Publication date:
08/04/2021
zzcms 201910 contains an access control vulnerability through escalation of privileges in /user/adv.php, which allows an attacker to modify data for further attacks such as CSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2021-30463

Publication date:
08/04/2021
VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2021

CVE-2021-30462

Publication date:
08/04/2021
VestaCP through 0.9.8-24 allows the admin user to escalate privileges to root because the Sudo configuration does not require a password to run /usr/local/vesta/bin scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-28925

Publication date:
08/04/2021
SQL injection vulnerability in Nagios Network Analyzer before 2.4.3 via the o[col] parameter to api/checks/read/.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2021

CVE-2021-28924

Publication date:
08/04/2021
Self Authenticated XSS in Nagios Network Analyzer before 2.4.2 via the nagiosna/groups/queries page.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2021