Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12864

Publication date:
24/06/2020
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2022

CVE-2020-12865

Publication date:
24/06/2020
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2020-12866

Publication date:
24/06/2020
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2022

CVE-2020-15014

Publication date:
24/06/2020
pramodmahato BlogCMS through 2019-12-31 has admin/changepass.php CSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2020

CVE-2020-15018

Publication date:
24/06/2020
playSMS through 1.4.3 is vulnerable to session fixation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-4071

Publication date:
24/06/2020
In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websites where the basic authentication is used or configured, i.e. BASIC_AUTH_LOGIN and BASIC_AUTH_PASSWORD is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located. Sites protected by IP address whitelisting only are unaffected by this vulnerability. This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package. A workaround without upgrading to version 0.3.4 is to stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting BASIC_AUTH_LOGIN and BASIC_AUTH_PASSWORD in Django project settings.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-12861

Publication date:
24/06/2020
A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2023

CVE-2020-7667

Publication date:
24/06/2020
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021

CVE-2020-15011

Publication date:
24/06/2020
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2020-15007

Publication date:
24/06/2020
A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-15006

Publication date:
24/06/2020
Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2020

CVE-2020-10279

Publication date:
24/06/2020
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022