Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-35668

Publication date:
23/12/2020
RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2020

CVE-2020-35666

Publication date:
23/12/2020
Steedos Platform through 1.21.24 allows NoSQL injection because the /api/collection/findone implementation in server/packages/steedos_base.js mishandles req.body validation, as demonstrated by MongoDB operator attacks such as an X-User-Id[$ne]=1 value.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-35665

Publication date:
23/12/2020
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2023

CVE-2020-35252

Publication date:
23/12/2020
Cross Site Scripting (XSS) vulnerability via the 'Full Name' parameter in the User Registration section of User Registration & Login System with Admin Panel 1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-35598

Publication date:
23/12/2020
ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. NOTE: this might be the same as CVE-2009-4623
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2021

CVE-2020-35269

Publication date:
23/12/2020
Nagios Core application version 4.2.4 is vulnerable to Site-Wide Cross-Site Request Forgery (CSRF) in many functions, like adding – deleting for hosts or servers.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2021

CVE-2020-35370

Publication date:
23/12/2020
A RCE vulnerability exists in Raysync below 3.3.3.8. An unauthenticated unauthorized attacker sending a specifically crafted request to override the specific file in server with malicious content can login as "admin", then to modify specific shell file to achieve remote code execution(RCE) on the hosting server.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-13969

Publication date:
23/12/2020
CRK Business Platform
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-13968

Publication date:
23/12/2020
CRK Business Platform
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-27397

Publication date:
23/12/2020
Marital - Online Matrimonial Project In PHP version 1.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) on the Hosting web server via uploading a maliciously crafted PHP file.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-28074

Publication date:
23/12/2020
SourceCodester Online Health Care System 1.0 is affected by SQL Injection which allows a potential attacker to bypass the authentication system and become an admin.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020

CVE-2020-28073

Publication date:
23/12/2020
SourceCodester Library Management System 1.0 is affected by SQL Injection allowing an attacker to bypass the user authentication and impersonate any user on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2020