Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-23639

Publication date:
10/12/2021
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-23663

Publication date:
10/12/2021
All versions of package sey are vulnerable to Prototype Pollution via the deepmerge() function.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-4089

Publication date:
10/12/2021
snipe-it is vulnerable to Improper Access Control
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2022

CVE-2021-23463

Publication date:
10/12/2021
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2023

CVE-2021-27984

Publication date:
10/12/2021
In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-27983

Publication date:
10/12/2021
Remote Code Execution (RCE) vulnerability exists in MaxSite CMS v107.5 via the Documents page.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-31747

Publication date:
10/12/2021
Missing SSL Certificate Validation issue exists in Pluck 4.7.15 in update_applet.php, which could lead to man-in-the-middle attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-43813

Publication date:
10/12/2021
Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2021-38937

Publication date:
10/12/2021
IBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authenticated user to cause the system to crash using a specially crafted IBMi Hypervisor call. IBM X-Force ID: 210894.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-38917

Publication date:
10/12/2021
IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-31746

Publication date:
10/12/2021
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2021-31745

Publication date:
10/12/2021
Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021