Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-37179

Publication date:
10/08/2021
A vulnerability has been identified in Solid Edge SE2021 (All Versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021

CVE-2021-37180

Publication date:
10/08/2021
A vulnerability has been identified in Solid Edge SE2021 (All Versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021

CVE-2021-37178

Publication date:
10/08/2021
A vulnerability has been identified in Solid Edge SE2021 (All Versions
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2021

CVE-2021-37172

Publication date:
10/08/2021
A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2022

CVE-2021-25659

Publication date:
10/08/2021
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2021

CVE-2020-28397

Publication date:
10/08/2021
A vulnerability has been identified in SIMATIC Drive Controller family (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2021

CVE-2021-21501

Publication date:
10/08/2021
Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-23150

Publication date:
09/08/2021
A SQL injection vulnerability in config.inc.php of rConfig 3.9.5 allows attackers to access sensitive database information via a crafted GET request to install/lib/ajaxHandlers/ajaxDbInstall.php.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2020-23149

Publication date:
09/08/2021
The dbName parameter in ajaxDbInstall.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a SQL injection and access sensitive database information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2020-23151

Publication date:
09/08/2021
rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2022

CVE-2020-23148

Publication date:
09/08/2021
The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2022

CVE-2021-38311

Publication date:
09/08/2021
In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2021