Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-5238

Publication date:
01/07/2020
The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-15489

Publication date:
01/07/2020
An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15490

Publication date:
01/07/2020
An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple buffer overflow vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges. (The set of affected scripts is similar to CVE-2020-12266.)
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2020

CVE-2019-15310

Publication date:
01/07/2020
An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-15311

Publication date:
01/07/2020
An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-15312

Publication date:
01/07/2020
An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-14196

Publication date:
01/07/2020
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7688

Publication date:
01/07/2020
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2020

CVE-2020-14057

Publication date:
01/07/2020
Monsta FTP 2.10.1 or below allows external control of paths used in filesystem operations. This allows attackers to read and write arbitrary local files, allowing an attacker to gain remote code execution in common deployments.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-13619

Publication date:
01/07/2020
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-14055

Publication date:
01/07/2020
Monsta FTP 2.10.1 or below is prone to a stored cross-site scripting vulnerability in the language setting due to insufficient output encoding.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-14056

Publication date:
01/07/2020
Monsta FTP 2.10.1 or below is prone to a server-side request forgery vulnerability due to insufficient restriction of the web fetch functionality. This allows attackers to read arbitrary local files and interact with arbitrary third-party services.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020