Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10508

Publication date:
27/03/2020
Sunnet eHRD, a human training and development management system, improperly stores system files. Attackers can use a specific URL and capture confidential information.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-3936

Publication date:
27/03/2020
UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2020-3920

Publication date:
27/03/2020
UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. Any user can access the privileged page to manage accounts through specific system directory.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2020-3921

Publication date:
27/03/2020
UltraLog Express device management software stores user’s information in cleartext. Any user can obtain accounts information through a specific page.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2020-10993

Publication date:
27/03/2020
Osmand through 2.0.0 allow XXE because of binary/BinaryMapIndexReader.java.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2020

CVE-2020-10992

Publication date:
27/03/2020
Azkaban through 3.84.0 allows XXE, related to validator/XmlValidatorManager.java and user/XmlUserManager.java.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2020

CVE-2020-10990

Publication date:
27/03/2020
An XXE issue exists in Accenture Mercury before 1.12.28 because of the platformlambda/core/serializers/SimpleXmlParser.java component.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2020

CVE-2020-10991

Publication date:
27/03/2020
Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2020

CVE-2020-9468

Publication date:
26/03/2020
The Community plugin 2.9.e-beta for Piwigo allows users to set image information on images in albums for which they do not have permission, by manipulating the image_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-9467

Publication date:
26/03/2020
Piwigo 2.10.1 has stored XSS via the file parameter in a /ws.php request because of the pwg.images.setInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2020-10823

Publication date:
26/03/2020
A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2020-10824

Publication date:
26/03/2020
A stack-based buffer overflow in /cgi-bin/activate.cgi through ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 2 of 3).
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025