Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-21783

Publication date:
24/06/2021
In IBOS 4.5.4 the email function has a cross site scripting (XSS) vulnerability in emailbody[content] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2021

CVE-2020-21785

Publication date:
24/06/2021
In IBOS 4.5.4 Open, the database backup has Command Injection Vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2021

CVE-2020-21786

Publication date:
24/06/2021
In IBOS 4.5.4 Open, Arbitrary File Inclusion causes getshell via /system/modules/dashboard/controllers/CronController.php.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2021

CVE-2021-31649

Publication date:
24/06/2021
In applications using jfinal 4.9.08 and below, there is a deserialization vulnerability when using redis,may be vulnerable to remote code execute
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2021

CVE-2020-18666

Publication date:
24/06/2021
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-18664. Reason: This candidate is a duplicate of CVE-2020-18664. Notes: All CVE users should reference CVE-2020-18664 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-18663

Publication date:
24/06/2021
Cross Site Scripting (XSS) vulnerability in gnuboard5
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2020-18662

Publication date:
24/06/2021
SQL Injection vulnerability in gnuboard5
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2021-32704

Publication date:
24/06/2021
DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability has been found in specific versions of DHIS2. This vulnerability affects the /api/trackedEntityInstances API endpoint in DHIS2 versions 2.34.4, 2.35.2, 2.35.3, 2.35.4, and 2.36.0. Earlier versions, such as 2.34.3 and 2.35.1 and all versions 2.33 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. However, we strongly recommend that all DHIS2 implementations using versions 2.34, 2.35 and 2.36 install these patches as soon as possible. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the /api/trackedEntityInstance endpoint as a temporary workaround while waiting to upgrade.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2021

CVE-2020-21788

Publication date:
24/06/2021
In CRMEB 3.1.0+ strict domain name filtering leads to SSRF(Server-Side Request Forgery). The vulnerable code is in file /crmeb/app/admin/controller/store/CopyTaobao.php.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2021

CVE-2021-23398

Publication date:
24/06/2021
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2021

CVE-2021-33348

Publication date:
24/06/2021
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2021

CVE-2020-21787

Publication date:
24/06/2021
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2021