Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-7879

Publication date:
30/11/2021
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2020-7880

Publication date:
30/11/2021
The vulnerabilty was discovered in ActiveX module related to NeoRS remote support program. This issue allows an remote attacker to download and execute remote file. It is because of improper parameter validation of StartNeoRS function in ActiveX.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-39000

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38999

Publication date:
30/11/2021
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38967

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38958

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-43202

Publication date:
30/11/2021
In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-43998

Publication date:
30/11/2021
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2022

CVE-2021-41679

Publication date:
30/11/2021
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-25987

Publication date:
30/11/2021
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-41678

Publication date:
30/11/2021
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-41677

Publication date:
30/11/2021
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021