Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12862

Publication date:
24/06/2020
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2020-12863

Publication date:
24/06/2020
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2020-12864

Publication date:
24/06/2020
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2022

CVE-2020-12865

Publication date:
24/06/2020
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2020-12866

Publication date:
24/06/2020
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2022

CVE-2020-12861

Publication date:
24/06/2020
A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2023

CVE-2020-7667

Publication date:
24/06/2020
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021

CVE-2020-15011

Publication date:
24/06/2020
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021

CVE-2020-15007

Publication date:
24/06/2020
A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-15006

Publication date:
24/06/2020
Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2020

CVE-2020-10280

Publication date:
24/06/2020
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2020

CVE-2020-10279

Publication date:
24/06/2020
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022