Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37593

Publication date:
30/07/2021
PEEL Shopping version 9.4.0 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands. Upon a successful SQL injection attack, an attacker can read sensitive data from the database and possibly modify database data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2021

CVE-2021-36766

Publication date:
30/07/2021
Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-37587

Publication date:
30/07/2021
In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-37601

Publication date:
30/07/2021
muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-37588

Publication date:
30/07/2021
In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-35478

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-35479

Publication date:
30/07/2021
Nagios Log Server before 2.1.9 contains Stored XSS in the custom column view for the alert history and audit log function through the affected pp parameter. This affects users who open a crafted link or third-party web page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2021-34166

Publication date:
30/07/2021
A SQL INJECTION vulnerability in Sourcecodester Simple Food Website 1.0 allows a remote attacker to Bypass Authentication and become Admin.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2021-35458

Publication date:
30/07/2021
Online Pet Shop We App 1.0 is vulnerable to Union SQL Injection in products.php (aka p=products) via the c or s parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2021

CVE-2021-35472

Publication date:
30/07/2021
An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2021

CVE-2021-34165

Publication date:
30/07/2021
A SQL Injection vulnerability in Sourcecodester Basic Shopping Cart 1.0 allows a remote attacker to Bypass Authentication and become Admin.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2021

CVE-2021-34802

Publication date:
30/07/2021
A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 and 4.3 could allow authenticated users to execute commands with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2021