Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2584

Publication date:
27/12/2022
The dag-pb codec can panic when decoding invalid blocks.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2021-4239

Publication date:
27/12/2022
The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2023

CVE-2017-20146

Publication date:
27/12/2022
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36564

Publication date:
27/12/2022
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36568

Publication date:
27/12/2022
Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2019-25072

Publication date:
27/12/2022
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36569

Publication date:
27/12/2022
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2018-25046

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2019-25073

Publication date:
27/12/2022
Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36559

Publication date:
27/12/2022
Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36560

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36561

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025