Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-23904

Publication date:
10/11/2021
A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file. NOTE: the vendor states "I cannot reproduce it" and it "is a demo program.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2020-23903

Publication date:
10/11/2021
A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-23902

Publication date:
10/11/2021
A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address may be used as a return value starting at Editor!TMethodImplementationIntercept+0x528a3.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23901

Publication date:
10/11/2021
A User Mode Write AV in Editor+0x5d15 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23900

Publication date:
10/11/2021
A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address controls Code Flow starting at Editor!TMethodImplementationIntercept+0x57a3b.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23899

Publication date:
10/11/2021
A User Mode Write AV in Editor+0x5f91 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23898

Publication date:
10/11/2021
A User Mode Write AV in Editor+0x5ea2 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23906

Publication date:
10/11/2021
FFmpeg N-98388-g76a3ee996b allows attackers to cause a denial of service (DoS) via a crafted audio file due to insufficient verification of data authenticity.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2021

CVE-2020-23889

Publication date:
10/11/2021
A User Mode Write AV starting at Editor!TMethodImplementationIntercept+0x4189c6 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted ico file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23888

Publication date:
10/11/2021
A User Mode Write AV in Editor!TMethodImplementationIntercept+0x53f6c3 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted psd file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23894

Publication date:
10/11/2021
A User Mode Write AV in ntdll!RtlpCoalesceFreeBlocks+0x268 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021

CVE-2020-23897

Publication date:
10/11/2021
A User Mode Write AV in Editor!TMethodImplementationIntercept+0x54dcec of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2021