Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-14377

Publication date:
30/09/2020
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2021

CVE-2020-8243

Publication date:
30/09/2020
A vulnerability in the Pulse Connect Secure
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2020-8256

Publication date:
30/09/2020
A vulnerability in the Pulse Connect Secure
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2020-8238

Publication date:
30/09/2020
A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2020-26149

Publication date:
30/09/2020
NATS nats.js before 2.0.0-209, nats.ws before 1.0.0-111, and nats.deno before 1.0.0-9 allow credential disclosure from a client to a server.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020

CVE-2020-26154

Publication date:
30/09/2020
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-26163

Publication date:
30/09/2020
BigBlueButton Greenlight before 2.5.6 allows HTTP header (Host and Origin) attacks, which can result in Account Takeover if a victim follows a spoofed password-reset link.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2020

CVE-2020-26157

Publication date:
30/09/2020
Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled during syncing. This leads to remote code execution because of Node integration.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2020

CVE-2020-26158

Publication date:
30/09/2020
Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled when the batch feature is triggered. This leads to remote code execution because of Node integration.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2020

CVE-2020-26150

Publication date:
30/09/2020
info.php in Logaritmo Aware CallManager 2012 allows remote attackers to obtain sensitive information via a direct request, which calls the phpinfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-26160

Publication date:
30/09/2020
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-26148

Publication date:
30/09/2020
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020