Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-5580

Publication date:
30/06/2020
Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to view and/or alter Single sign-on settings via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-5582

Publication date:
30/06/2020
Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to alter the data for the file attached to Report via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-5583

Publication date:
30/06/2020
Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to obtain unauthorized Multi-Report's data via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-5584

Publication date:
30/06/2020
Cybozu Garoon 4.0.0 to 5.0.1 allow remote attackers to obtain unintended information via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20416

Publication date:
30/06/2020
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the project configuration feature. The affected versions are before version 8.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2020

CVE-2019-20415

Publication date:
30/06/2020
Atlassian Jira Server and Data Center in affected versions allows remote attackers to modify logging and profiling settings via a cross-site request forgery (CSRF) vulnerability. The affected versions are before version 7.13.3, and from version 8.0.0 before 8.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2022

CVE-2020-15393

Publication date:
29/06/2020
In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2022

CVE-2020-15389

Publication date:
29/06/2020
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2022

CVE-2020-15368

Publication date:
29/06/2020
AsrDrv103.sys in the ASRock RGB Driver does not properly restrict access from user space, as demonstrated by triggering a triple fault via a request to zero CR3.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2024

CVE-2020-4037

Publication date:
29/06/2020
In OAuth2 Proxy from version 5.1.1 and less than version 6.0.0, users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. This has been fixed in version 6.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2020

CVE-2020-4067

Publication date:
29/06/2020
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-15043

Publication date:
29/06/2020
iBall WRB303N devices allow CSRF attacks, as demonstrated by enabling remote management, enabling DHCP, or modifying the subnet range for IP addresses.
Severity CVSS v4.0: Pending analysis
Last modification:
06/07/2020