Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-6795

Publication date:
02/03/2020
When processing a message that contains multiple S/MIME signatures, a bug in the MIME processing code caused a null pointer dereference, leading to an unexploitable crash. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2020

CVE-2019-17026

Publication date:
02/03/2020
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2020-9547

Publication date:
02/03/2020
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9548

Publication date:
02/03/2020
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9546

Publication date:
02/03/2020
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9545

Publication date:
02/03/2020
Pale Moon 28.x before 28.8.4 has a segmentation fault related to module scripting, as demonstrated by a Lacoste web site.
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2022

CVE-2020-9534

Publication date:
02/03/2020
fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup webpage parameter when f_radius_ip1 is malformed.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2023

CVE-2020-9535

Publication date:
02/03/2020
fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup_Wizard webpage parameter when f_radius_ip1 is malformed.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2023

CVE-2020-9540

Publication date:
02/03/2020
Sophos HitmanPro.Alert before build 861 allows local elevation of privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-6803

Publication date:
28/02/2020
An open redirect is present on the gateway's login page, which could cause a user to be redirected to a malicious site after logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020

CVE-2020-6804

Publication date:
28/02/2020
A reflected XSS vulnerability exists within the gateway, allowing an attacker to craft a specialized URL which could steal the user's authentication token. When combined with CVE-2020-6803, an attacker could fully compromise the system.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2015-3006

Publication date:
28/02/2020
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/03/2020