Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-20842

Publication date:
19/06/2020
An issue was discovered in Mattermost Server before 5.18.0, 5.17.2, 5.16.4, 5.15.4, and 5.9.7. There is SQL injection by admins via SearchAllChannels.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2020

CVE-2019-20844

Publication date:
19/06/2020
An issue was discovered in Mattermost Server before 5.18.0, 5.17.2, 5.16.4, 5.15.4, and 5.9.7. An attacker can spoof a direct-message channel by changing the type of a channel.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2020

CVE-2019-20846

Publication date:
19/06/2020
An issue was discovered in Mattermost Server before 5.18.0. It has weak permissions for server-local file storage.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2020

CVE-2019-20848

Publication date:
19/06/2020
An issue was discovered in Mattermost Mobile Apps before 1.26.0. The Quick Reply feature mishandles crafted replies.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2020

CVE-2019-20847

Publication date:
19/06/2020
An issue was discovered in Mattermost Server before 5.18.0. An attacker can send a user_typing WebSocket event to any channel.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2020

CVE-2020-14462

Publication date:
19/06/2020
CALDERA 2.7.0 allows XSS via the Operation Name box.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2020

CVE-2020-14019

Publication date:
19/06/2020
Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7679

Publication date:
19/06/2020
In all versions of package casperjs, the mergeObjects utility function is susceptible to Prototype Pollution.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2022

CVE-2020-5590

Publication date:
19/06/2020
Directory traversal vulnerability in EC-CUBE 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 allows remote authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2020

CVE-2020-4059

Publication date:
18/06/2020
In mversion before 2.0.0, there is a command injection vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This vulnerability is patched by version 2.0.0. Previous releases are deprecated in npm. As a workaround, make sure to escape git commit messages when using the commitMessage option for the update function.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2020

CVE-2020-12887

Publication date:
18/06/2020
Memory leaks were discovered in the CoAP library in Arm Mbed OS 5.15.3 when using the Arm mbed-coap library 5.1.5. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses the CoAP option number field of all options present in the input packet. Each option number is calculated as a sum of the previous option number and a delta of the current option. The delta and the previous option number are expressed as unsigned 16-bit integers. Due to lack of overflow detection, it is possible to craft a packet that wraps the option number around and results in the same option number being processed again in a single packet. Certain options allocate memory by calling a memory allocation function. In the cases of COAP_OPTION_URI_QUERY, COAP_OPTION_URI_PATH, COAP_OPTION_LOCATION_QUERY, and COAP_OPTION_ETAG, there is no check on whether memory has already been allocated, which in conjunction with the option number integer overflow may lead to multiple assignments of allocated memory to a single pointer. This has been demonstrated to lead to memory leak by buffer orphaning. As a result, the memory is never freed.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-12886

Publication date:
18/06/2020
A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses the CoAP packet header starting from the message token. The length of the token in the received message is provided in the first byte parsed by the sn_coap_parser_options_parse() function. The length encoded in the message is not validated against the actual input buffer length before accessing the token. As a result, memory access outside of the intended boundary of the buffer may occur.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2020