Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-24676

Publication date:
04/10/2021
The Better Find and Replace WordPress plugin before 1.2.9 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2021

CVE-2021-24465

Publication date:
04/10/2021
The Meow Gallery WordPress plugin before 4.1.9 does not sanitise, validate or escape the ids attribute of its gallery shortcode (available for users as low as Contributor) before using it in an SQL statement, leading to an authenticated SQL Injection issue. The injection also allows the returned values to be manipulated in a way that could lead to data disclosure and arbitrary objects to be deserialized.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2021

CVE-2021-24654

Publication date:
04/10/2021
The User Registration WordPress plugin before 2.0.2 does not properly sanitise the user_registration_profile_pic_url value when submitted directly via the user_registration_update_profile_details AJAX action. This could allow any authenticated user, such as subscriber, to perform Stored Cross-Site attacks when their profile is viewed
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2021

CVE-2021-22557

Publication date:
04/10/2021
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-41869

Publication date:
04/10/2021
SuiteCRM 7.10.x before 7.10.33 and 7.11.x before 7.11.22 is vulnerable to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-40323

Publication date:
04/10/2021
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2021

CVE-2021-40324

Publication date:
04/10/2021
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2021

CVE-2021-41285

Publication date:
04/10/2021
Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-40325

Publication date:
04/10/2021
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-41322

Publication date:
04/10/2021
Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-21706

Publication date:
04/10/2021
In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2021

CVE-2021-21705

Publication date:
04/10/2021
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2022