Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-0524

Publication date:
17/02/2021
Improper default permissions in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may allow an authenticated user to potentially enable denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2021

CVE-2020-0521

Publication date:
17/02/2021
Insufficient control flow management in some Intel(R) Graphics Drivers before version 15.45.32.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2021

CVE-2020-0522

Publication date:
17/02/2021
Improper initialization in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may allow a privileged user to potentially enable denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2021

CVE-2020-0544

Publication date:
17/02/2021
Insufficient control flow management in the kernel mode driver for some Intel(R) Graphics Drivers before version 15.36.39.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2021

CVE-2020-0518

Publication date:
17/02/2021
Improper access control in the Intel(R) HD Graphics Control Panel before version 15.40.46.5144 and 15.36.39.5143 may allow an authenticated user to potentially enable denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2021

CVE-2020-0525

Publication date:
17/02/2021
Improper access control in firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may allow a privileged user to potentially enable denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-0523

Publication date:
17/02/2021
Improper access control in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may potentially allow a privileged user to enable a denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2021-22553

Publication date:
17/02/2021
Any git operation is passed through Jetty and a session is created. No expiry is set for the session and Jetty does not automatically dispose of the session. Over multiple git actions, this can lead to a heap memory exhaustion for Gerrit servers. We recommend upgrading Gerrit to any of the versions listed above.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-22857

Publication date:
17/02/2021
The CGE page with download function contains a Directory Traversal vulnerability. Attackers can use this loophole to download system files arbitrarily.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2021

CVE-2021-22856

Publication date:
17/02/2021
The CGE property management system contains SQL Injection vulnerabilities. Remote attackers can inject SQL commands into the parameters in Cookie and obtain data in the database without privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2021

CVE-2021-22858

Publication date:
17/02/2021
Attackers can access the CGE account management function without privilege for permission elevation and execute arbitrary commands or files after obtaining user permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2022

CVE-2021-23885

Publication date:
17/02/2021
Privilege escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.8 allows an authenticated user to gain elevated privileges through the User Interface and execute commands on the appliance via incorrect improper neutralization of user input in the troubleshooting page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023