Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-25141

Publication date:
09/02/2021
A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2021

CVE-2021-25139

Publication date:
09/02/2021
A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a stack based buffer overflow using user supplied input to the `khuploadfile.cgi` CGI ELF. The stack based buffer overflow could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2021

CVE-2021-25140

Publication date:
09/02/2021
A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a directory traversal in user supplied input to the `khuploadfile.cgi` CGI ELF. The directory traversal could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2021

CVE-2021-22663

Publication date:
09/02/2021
Cscape (All versions prior to 9.90 SP3.5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2021

CVE-2020-27008

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2021

CVE-2020-27004

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2021

CVE-2020-27007

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2021

CVE-2020-27005

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2021

CVE-2020-27003

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2021

CVE-2020-27002

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2022

CVE-2020-27001

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2022

CVE-2020-27006

Publication date:
09/02/2021
A vulnerability has been identified in JT2Go (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2021