Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10216

Publication date:
07/03/2020
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-10215

Publication date:
07/03/2020
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-10214

Publication date:
07/03/2020
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. There is a stack-based buffer overflow in the httpd binary. It allows an authenticated user to execute arbitrary code via a POST to ntp_sync.cgi with a sufficiently long parameter ntp_server.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-10213

Publication date:
07/03/2020
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-9281

Publication date:
07/03/2020
A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8439

Publication date:
07/03/2020
Monstra CMS through 3.0.4 allows remote authenticated users to take over arbitrary user accounts via a modified login parameter to an edit URI, as demonstrated by login=victim to the users/21/edit URI.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-9470

Publication date:
07/03/2020
An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-10212

Publication date:
07/03/2020
upload.php in Responsive FileManager 9.13.4 and 9.14.0 allows SSRF via the url parameter because file-extension blocking is mishandled and because it is possible for a DNS hostname to resolve to an internal IP address. For example, an SSRF attempt may succeed if a .ico filename is added to the PATH_INFO. Also, an attacker could create a DNS hostname that resolves to the 0.0.0.0 IP address for DNS pinning. NOTE: this issue exists because of an incomplete fix for CVE-2018-14728.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-8634

Publication date:
07/03/2020
Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2020

CVE-2020-10020

Publication date:
07/03/2020
Rejected reason: Number assigned to issue that does not qualify for a CVE
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8635

Publication date:
07/03/2020
Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files. This allows local users to arbitrarily create FTP users with full privileges, and escalate privileges within the operating system by modifying system files.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2017-14208

Publication date:
07/03/2020
Rejected reason: Unused CVE for 2017
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023