Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8127

Publication date:
28/02/2020
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-9465

Publication date:
28/02/2020
An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2021

CVE-2019-19943

Publication date:
28/02/2020
The HTTP service in quickweb.exe in Pablo Quick 'n Easy Web Server 3.3.8 allows Remote Unauthenticated Heap Memory Corruption via a large host or domain parameter. It may be possible to achieve remote code execution because of a double free.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-15609

Publication date:
28/02/2020
The kill-port-process package version
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2020

CVE-2020-8132

Publication date:
28/02/2020
Lack of input validation in pdf-image npm package version
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-9466

Publication date:
28/02/2020
The Export Users to CSV plugin through 1.4.2 for WordPress allows CSV Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-1877

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-1876

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020

CVE-2020-1881

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2022

CVE-2020-1874

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-1873

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020

CVE-2020-1875

Publication date:
28/02/2020
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020