Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-39271

Publication date:
30/08/2021
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2021

CVE-2021-38385

Publication date:
30/08/2021
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2023

CVE-2021-37749

Publication date:
30/08/2021
MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40172

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40176

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5225 allows stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40177

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40173

Publication date:
29/08/2021
Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40174

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40175

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-40178

Publication date:
29/08/2021
Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2021

CVE-2021-38154

Publication date:
29/08/2021
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2021-39174

Publication date:
28/08/2021
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2023