Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10917

Publication date:
22/07/2020
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2020

CVE-2020-15126

Publication date:
22/07/2020
In parser-server from version 3.5.0 and before 4.3.0, an authenticated user using the viewer GraphQL query can by pass all read security on his User object and can also by pass all objects linked via relation or Pointer on his User object.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2020

CVE-2020-15904

Publication date:
22/07/2020
A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to write to heap memory (beyond allocated bounds) via a crafted patch file.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2023

CVE-2020-15901

Publication date:
22/07/2020
In Nagios XI before 5.7.3, ajaxhelper.php allows remote authenticated attackers to execute arbitrary commands via cmdsubsys.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2022

CVE-2020-15902

Publication date:
22/07/2020
Graph Explorer in Nagios XI before 5.7.2 allows XSS via the link url option.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2022

CVE-2020-4385

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 179266.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4397

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 transmits sensitive information in plain text which could be obtained by an attacker using man in the middle techniques. IBM X-Force ID: 179428.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4399

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 could allow an authenticated user to send malformed requests to cause a denial of service against the server. IBM X-Force ID: 179476.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4369

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 stores highly sensitive information in cleartext that could be obtained by a user. IBM X-Force ID: 179004.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4372

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 179009
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4371

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 contains sensitive information in leftover debug code that could be used aid a local user in further attacks against the system. IBM X-Force ID: 179008.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2020

CVE-2020-4400

Publication date:
22/07/2020
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 179478.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021