Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-24508

Publication date:
13/09/2021
The Smash Balloon Social Post Feed WordPress plugin before 2.19.2 does not sanitise or escape the feedID POST parameter in its feed_locator AJAX action (available to both authenticated and unauthenticated users) before outputting a truncated version of it in the admin dashboard, leading to an unauthenticated Stored Cross-Site Scripting issue which will be executed in the context of a logged in administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-24510

Publication date:
13/09/2021
The MF Gig Calendar WordPress plugin before 1.2 does not sanitise and escape the id GET parameter before outputting back in the admin dashboard when editing an Event, leading to a reflected Cross-Site Scripting issue
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-24490

Publication date:
13/09/2021
The Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-24491

Publication date:
13/09/2021
The Fileviewer WordPress plugin through 2.2 does not have CSRF checks in place when performing actions such as upload and delete files. As a result, attackers could make a logged in administrator delete and upload arbitrary files via a CSRF attack
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2021-24431

Publication date:
13/09/2021
The Language Bar Flags WordPress plugin through 1.0.8 does not have any CSRF in place when saving its settings and did not sanitise or escape them when generating the flag bar in the frontend. This could allow attackers to make a logged in admin change the settings, and set Cross-Site Scripting payload in them, which will be executed in the frontend for all users
Severity CVSS v4.0: Pending analysis
Last modification:
07/12/2022

CVE-2021-32132

Publication date:
13/09/2021
The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-32135

Publication date:
13/09/2021
The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-29643

Publication date:
13/09/2021
PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-32137

Publication date:
13/09/2021
Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-32134

Publication date:
13/09/2021
The gf_odf_desc_copy function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-32136

Publication date:
13/09/2021
Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021

CVE-2021-40214

Publication date:
13/09/2021
Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2021