Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-16015

Publication date:
08/01/2021
Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-28208

Publication date:
08/01/2021
An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2021

CVE-2020-17502

Publication date:
08/01/2021
Barco TransForm N before 3.8 allows Command Injection (issue 2 of 4). The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users of the administration panel to perform authenticated remote code execution. An issue exists in split_card_cmd.php in which the http parameters xmodules, ymodules and savelocking are not properly handled. The NDN-210 is part of Barco TransForm N solution and includes the patch from TransForm N version 3.8 onwards.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2021

CVE-2020-17504

Publication date:
08/01/2021
The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users to the administration panel to perform authenticated remote code execution. An issue exists in ngpsystemcmd.php in which the http parameters "x_modules" and "y_modules" are not properly handled. The NDN-210 is part of Barco TransForm N solution and this vulnerability is patched from TransForm N version 3.8 onwards.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2021

CVE-2020-17503

Publication date:
08/01/2021
The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users to the administration panel to perform authenticated remote code execution. An issue exists in split_card_cmd.php in which the http parameter "locking" is not properly handled. The NDN-210 is part of Barco TransForm N solution and this vulnerability is patched from TransForm N version 3.8 onwards.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2021

CVE-2020-26664

Publication date:
08/01/2021
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media player 3.0.11 allows attackers to trigger a heap-based buffer overflow via a crafted .mkv file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2020-25678

Publication date:
08/01/2021
A flaw was found in ceph in versions prior to 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2023

CVE-2020-35131

Publication date:
08/01/2021
Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2021

CVE-2020-5805

Publication date:
08/01/2021
In Marvell QConvergeConsole GUI
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2021

CVE-2020-5804

Publication date:
08/01/2021
Marvell QConvergeConsole GUI
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2021

CVE-2020-8584

Publication date:
08/01/2021
Element OS versions prior to 1.8P1 and 12.2 are susceptible to a vulnerability that could allow an unauthenticated remote attacker to perform arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-27260

Publication date:
08/01/2021
Innokas Yhtymä Oy Vital Signs Monitor VC150 prior to Version 1.7.15 HL7 v2.x injection vulnerabilities exist in the affected products that allow physically proximate attackers with a connected barcode reader to inject HL7 v2.x segments into specific HL7 v2.x messages via multiple expected parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2021