Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-34578

Publication date:
31/08/2021
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2021-3749

Publication date:
31/08/2021
axios is vulnerable to Inefficient Regular Expression Complexity
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-34559

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-34561

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-34563

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-34560

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-34562

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-34565

Publication date:
31/08/2021
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2021-38143

Publication date:
31/08/2021
An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2021-38144

Publication date:
31/08/2021
An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS].
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2021-38145

Publication date:
31/08/2021
An issue was discovered in Form Tools through 3.0.20. SQL Injection can occur via the export_group_id field when a low-privileged user (client) tries to export a form with data, e.g., manipulation of modules/export_manager/export.php?export_group_id=1&export_group_1_results=all&export_type_id=1.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2021-36356

Publication date:
31/08/2021
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2022