Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15608

Publication date:
15/03/2020
The package integrity validation in yarn
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2020

CVE-2020-8141

Publication date:
15/03/2020
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2020

CVE-2020-10587

Publication date:
14/03/2020
antiX and MX Linux allow local users to achieve root access via "persist-config --command /bin/sh" because of the Sudo configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-10578

Publication date:
14/03/2020
An arbitrary file read vulnerability exists in system/controller/backend/template.php in QCMS v3.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-10577

Publication date:
14/03/2020
An issue was discovered in Janus through 0.9.1. janus.c has multiple concurrent threads that misuse the source property of a session, leading to a race condition when claiming sessions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2020

CVE-2020-10576

Publication date:
14/03/2020
An issue was discovered in Janus through 0.9.1. plugins/janus_voicemail.c in the VoiceMail plugin has a race condition that could cause a server crash.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2020

CVE-2020-10574

Publication date:
14/03/2020
An issue was discovered in Janus through 0.9.1. janus.c tries to use a string that doesn't actually exist during a "query_logger" Admin API request, because of a typo in the JSON validation.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2020-10573

Publication date:
14/03/2020
An issue was discovered in Janus through 0.9.1. janus_audiobridge.c has a double mutex unlock when listing private rooms in AudioBridge.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2020-10575

Publication date:
14/03/2020
An issue was discovered in Janus through 0.9.1. plugins/janus_videocall.c in the VideoCall plugin mishandles session management because a race condition causes some references to be freed too early or too many times.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2020-10571

Publication date:
14/03/2020
An issue was discovered in psd-tools before 1.9.4. The Cython implementation of RLE decoding did not check for malicious data.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2020-10568

Publication date:
14/03/2020
The sitepress-multilingual-cms (WPML) plugin before 4.3.7-b.2 for WordPress has CSRF due to a loose comparison. This leads to remote code execution in includes/class-wp-installer.php via a series of requests that leverage unintended comparisons of integers to strings.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10567

Publication date:
14/03/2020
An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2023