Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-14962

Publication date:
22/06/2020
Multiple XSS vulnerabilities in the Final Tiles Gallery plugin before 3.4.19 for WordPress allow remote attackers to inject arbitrary web script or HTML via the Title (aka imageTitle) or Caption (aka description) field of an image to wp-admin/admin-ajax.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2020

CVE-2020-14467

Publication date:
22/06/2020
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14961

Publication date:
22/06/2020
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2021

CVE-2020-14958

Publication date:
21/06/2020
In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2020

CVE-2020-14954

Publication date:
21/06/2020
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14950

Publication date:
21/06/2020
aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via shell metacharacters in a modified /system?action=ServiceAdmin request (start, stop, or restart) to the setting menu of Sotfware Store.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-14942

Publication date:
21/06/2020
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2020

CVE-2020-14932

Publication date:
20/06/2020
compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2020

CVE-2020-14933

Publication date:
20/06/2020
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2020-13263

Publication date:
19/06/2020
An authorization issue relating to project maintainer impersonation was identified in GitLab EE 9.5 and later through 13.0.1 that could allow unauthorized users to impersonate as a maintainer to perform limited actions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2020

CVE-2020-13264

Publication date:
19/06/2020
Kubernetes cluster token disclosure in GitLab CE/EE 10.3 and later through 13.0.1 allows other group maintainers to view Kubernetes cluster token
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2020

CVE-2020-13261

Publication date:
19/06/2020
Amazon EKS credentials disclosure in GitLab CE/EE 12.6 and later through 13.0.1 allows other administrators to view Amazon EKS credentials via HTML source code
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021