Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-35711

Publication date:
25/12/2020
An issue has been discovered in the arc-swap crate before 0.4.8 (and 1.x before 1.1.0) for Rust. Use of arc_swap::access::Map with the Constant test helper (or with a user-supplied implementation of the Access trait) could sometimes lead to dangling references being returned by the map.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2020

CVE-2020-35710

Publication date:
25/12/2020
Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2020

CVE-2020-35709

Publication date:
25/12/2020
bloofoxCMS 0.5.2.1 allows admins to upload arbitrary .php files (with "Content-Type: application/octet-stream") to ../media/images/ via the admin/index.php?mode=tools&page=upload URI, aka directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2021

CVE-2020-35707

Publication date:
25/12/2020
Daybyday 2.1.0 allows stored XSS via the Company Name parameter to the New Client screen.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35708

Publication date:
25/12/2020
phpList 3.5.9 allows SQL injection by admins who provide a crafted fourth line of a file to the "Config - Import Administrators" page.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35705

Publication date:
25/12/2020
Daybyday 2.1.0 allows stored XSS via the Name parameter to the New User screen.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35706

Publication date:
25/12/2020
Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Project screen.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35704

Publication date:
25/12/2020
Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Lead screen.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35702

Publication date:
25/12/2020
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2020-26282

Publication date:
24/12/2020
BrowserUp Proxy allows you to manipulate HTTP requests and responses, capture HTTP content, and export performance data as a HAR file. BrowserUp Proxy works well as a standalone proxy server, but it is especially useful when embedded in Selenium tests. A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been patched in version 2.1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2020

CVE-2020-11093

Publication date:
24/12/2020
Hyperledger Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In Hyperledger Indy before version 1.12.4, there is lack of signature verification on a specific transaction which enables an attacker to make certain unauthorized alterations to the ledger. Updating a DID with a nym transaction will be written to the ledger if neither ROLE or VERKEY are being changed, regardless of sender. A malicious DID with no particular role can ask an update for another DID (but cannot modify its verkey or role). This is bad because 1) Any DID can write a nym transaction to the ledger (i.e., any DID can spam the ledger with nym transactions), 2) Any DID can change any other DID's alias, 3) The update transaction modifies the ledger metadata associated with a DID.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2020

CVE-2020-28912

Publication date:
24/12/2020
With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2020