Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-11953

Publication date:
14/07/2020
An issue was discovered on Rittal PDU-3C002DEC through 5.15.40 and CMCIII-PU-9333E0FB through 3.15.70_4 devices. Attackers can execute code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2020

CVE-2020-11955

Publication date:
14/07/2020
An issue was discovered on Rittal PDU-3C002DEC through 5.15.70 and CMCIII-PU-9333E0FB through 3.15.70 devices. There are insecure permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2020

CVE-2020-1948

Publication date:
14/07/2020
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2020

CVE-2020-10045

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-10044

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-15720

Publication date:
14/07/2020
In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-13753

Publication date:
14/07/2020
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-15719

Publication date:
14/07/2020
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2020-10043

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-10041

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-10037

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-10038

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020