Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-41497

Publication date:
17/12/2021
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41498

Publication date:
17/12/2021
Buffer overflow in ajaxsoundstudio.com Pyo &lt and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41499

Publication date:
17/12/2021
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-23814

Publication date:
17/12/2021
This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading.<br /> <br /> An attacker may be able to reproduce the following steps:<br /> <br /> 1. Install a package with a web Laravel application.<br /> 2. Navigate to the Upload window<br /> 3. Upload an image file, then capture the request<br /> 4. Edit the request contents with a malicious file (webshell)<br /> 5. Enter the path of file uploaded on URL - Remote Code Execution<br /> <br /> <br /> **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2021-23450

Publication date:
17/12/2021
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2021-41496

Publication date:
17/12/2021
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-23803

Publication date:
17/12/2021
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-23797

Publication date:
17/12/2021
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41495

Publication date:
17/12/2021
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &amp;lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-34141

Publication date:
17/12/2021
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2023

CVE-2021-43840

Publication date:
17/12/2021
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2021

CVE-2021-43838

Publication date:
17/12/2021
jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023