Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-2507

Publication date:
03/02/2021
The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2021

CVE-2020-28653

Publication date:
03/02/2021
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2022

CVE-2020-28895

Publication date:
03/02/2021
In Wind River VxWorks, memory allocator has a possible overflow in calculating the memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2020-29582

Publication date:
03/02/2021
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-27222

Publication date:
03/02/2021
In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2021

CVE-2020-25208

Publication date:
03/02/2021
In JetBrains YouTrack before 2020.4.4701, an attacker could enumerate users via the REST API without appropriate permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2021

CVE-2020-29164

Publication date:
03/02/2021
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by cross-site scripting (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2021

CVE-2020-29163

Publication date:
03/02/2021
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2021

CVE-2020-29165

Publication date:
03/02/2021
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by incorrect access control, which can result in remotely gaining administrator privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-29166

Publication date:
03/02/2021
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by file read/manipulation, which can result in remote information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-28144

Publication date:
03/02/2021
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2021

CVE-2021-0365

Publication date:
03/02/2021
In display driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05454782.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2021