Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-43283

Publication date:
30/11/2021
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-43282

Publication date:
30/11/2021
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-22095

Publication date:
30/11/2021
In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-26612

Publication date:
30/11/2021
An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2020-7879

Publication date:
30/11/2021
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2020-7880

Publication date:
30/11/2021
The vulnerabilty was discovered in ActiveX module related to NeoRS remote support program. This issue allows an remote attacker to download and execute remote file. It is because of improper parameter validation of StartNeoRS function in ActiveX.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-39000

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38999

Publication date:
30/11/2021
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38967

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-38958

Publication date:
30/11/2021
IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2021-43202

Publication date:
30/11/2021
In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-43998

Publication date:
30/11/2021
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2022