Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-3440

Publication date:
26/08/2020
A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2020

CVE-2020-3439

Publication date:
26/08/2020
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2020

CVE-2020-3485

Publication date:
26/08/2020
A vulnerability in the role-based access control (RBAC) functionality of the web management software of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because the web management software does not properly handle RBAC. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to view and delete certain screen content on the system that the attacker would not normally have privileges to access.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-23657

Publication date:
26/08/2020
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Configuration."
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2020

CVE-2020-23656

Publication date:
26/08/2020
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Content."
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2020

CVE-2020-23655

Publication date:
26/08/2020
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Configuration."
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2020

CVE-2020-23654

Publication date:
26/08/2020
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) via the module "Shop."
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2020

CVE-2020-5928

Publication date:
26/08/2020
In versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, BIG-IP ASM Configuration utility CSRF protection token can be reused multiple times.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2020

CVE-2020-13821

Publication date:
26/08/2020
An issue was discovered in HiveMQ Broker Control Center 4.3.2. A crafted clientid parameter in an MQTT packet (sent to the Broker) is reflected in the client section of the management console. The attacker's JavaScript is loaded in a browser, which can lead to theft of the session and cookie of the administrator's account of the Broker.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-15482

Publication date:
26/08/2020
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The device enables an unencrypted TELNET service by default, with a blank password for the admin account. This allows an attacker to gain root access to the device over the local network.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15483

Publication date:
26/08/2020
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The physical UART debug port provides a shell, without requiring a password, with complete access.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2020-15486

Publication date:
26/08/2020
An issue was discovered on Dr Trust ECG Pen 2.00.08 devices. Because the Bluetooth LE support is implemented without a requirement for pairing or security, any attacker can access the GATT server of the device and can sniff the data being broadcasted while a measurement is being done. Also, saved data can also be extracted over a Bluetooth connection. In addition, an attacker can launch a man-in-the-middle attack against data integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021