Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-27341

Publication date:
16/09/2021
OpenSIS Community Edition version
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-34572

Publication date:
16/09/2021
Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2020-14119

Publication date:
16/09/2021
There is command injection in the addMeshNode interface of xqnetwork.lua, which leads to command execution under administrator authority on Xiaomi router AX3600 with rom versionrom
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2020-14124

Publication date:
16/09/2021
There is a buffer overflow in librsa.so called by getwifipwdurl interface, resulting in code execution on Xiaomi router AX3600 with ROM version =rom
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-34576

Publication date:
16/09/2021
In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-34571

Publication date:
16/09/2021
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2021-34573

Publication date:
16/09/2021
In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2021

CVE-2020-14109

Publication date:
16/09/2021
There is command injection in the meshd program in the routing system, resulting in command execution under administrator authority on Xiaomi router AX3600 with ROM version =
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2020-14130

Publication date:
16/09/2021
Some js interfaces in the Xiaomi community were exposed, causing sensitive functions to be maliciously called on Xiaomi community app Affected Version
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2021

CVE-2021-40067

Publication date:
16/09/2021
The access controls on the Mobility read-write API improperly validate user access permissions; this API is disabled by default. If the API is manually enabled, attackers with both network access to the API and valid credentials can read and write data to it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v12.14.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2021

CVE-2021-40066

Publication date:
16/09/2021
The access controls on the Mobility read-only API improperly validate user access permissions. Attackers with both network access to the API and valid credentials can read data from it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v11.76 and Mobility v12.14.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2021

CVE-2021-39128

Publication date:
16/09/2021
Affected versions of Atlassian Jira Server or Data Center using the Jira Service Management addon allow remote attackers with JIRA Administrators access to execute arbitrary Java code via a server-side template injection vulnerability in the Email Template feature. The affected versions of Jira Server or Data Center are before version 8.13.12, and from version 8.14.0 before 8.19.1.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024