Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10613

Publication date:
15/04/2020
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers to disclose sensitive information due to the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. Authentication is not required to exploit this vulnerability. Only applicable to installations using DNP3 Data Sets.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2020

CVE-2019-20655

Publication date:
15/04/2020
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR500 before 2.3.2.56 and XR700 before 1.0.1.20.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-20659

Publication date:
15/04/2020
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400v2 before 1.0.4.84, R6700 before 1.0.2.8, R6700v3 before 1.0.4.84, R6900 before 1.0.2.8, and R7900 before 1.0.3.10.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12522

Publication date:
15/04/2020
An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
Severity CVSS v4.0: Pending analysis
Last modification:
10/03/2021

CVE-2019-12521

Publication date:
15/04/2020
An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20652

Publication date:
15/04/2020
NETGEAR WAC505 devices before 8.2.1.16 are affected by disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20653

Publication date:
15/04/2020
Certain NETGEAR devices are affected by denial of service. This affects WAC505 before 8.0.6.4 and WAC510 before 8.0.6.4.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20654

Publication date:
15/04/2020
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC505 before 8.0.6.4 and WAC510 before 8.0.6.4.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-12524

Publication date:
15/04/2020
An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2021

CVE-2019-20651

Publication date:
15/04/2020
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects WAC505 before 8.2.1.16 and WAC510 before 8.2.1.16.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2020-11789

Publication date:
15/04/2020
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects R6400v2 before 1.0.4.84, R6700 before 1.0.2.8, R6700v3 before 1.0.4.84, R6900 before 1.0.2.8, and R7900 before 1.0.3.10.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11790

Publication date:
15/04/2020
NETGEAR R7800 devices before 1.0.2.68 are affected by remote code execution by unauthenticated attackers.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021