Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-5871

Publication date:
30/04/2020
On BIG-IP 14.1.0-14.1.2.3, undisclosed requests can lead to a denial of service (DoS) when sent to BIG-IP HTTP/2 virtual servers. The problem can occur when ciphers, which have been blacklisted by the HTTP/2 RFC, are used on backend servers. This is a data-plane issue. There is no control-plane exposure.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2020

CVE-2019-12425

Publication date:
30/04/2020
Apache OFBiz 17.12.01 is vulnerable to Host header injection by accepting arbitrary host
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-0235

Publication date:
30/04/2020
Apache OFBiz 17.12.01 is vulnerable to some CSRF attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-11015

Publication date:
30/04/2020
A vulnerability has been disclosed in thinx-device-api IoT Device Management Server before version 2.5.0. Device MAC address can be spoofed. This means initial registration requests without UDID and spoofed MAC address may pass to create new UDID with same MAC address. Full impact needs to be reviewed further. Applies to all (mostly ESP8266/ESP32) users. This has been fixed in firmware version 2.5.0.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2022

CVE-2020-1752

Publication date:
30/04/2020
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-12050

Publication date:
30/04/2020
SQLiteODBC 0.9996, as packaged for certain Linux distributions as 0.9996-4, has a race condition leading to root privilege escalation because any user can replace a /tmp/sqliteodbc$$ file with new contents that cause loading of an arbitrary library.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-11651

Publication date:
30/04/2020
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2020-11652

Publication date:
30/04/2020
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2020-10691

Publication date:
30/04/2020
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-6010

Publication date:
30/04/2020
LearnPress Wordpress plugin version prior and including 3.2.6.7 is vulnerable to SQL Injection
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2021

CVE-2020-6579

Publication date:
30/04/2020
Cross-site scripting (XSS) vulnerability in mailhive/cloudbeez/cloudloader.php and mailhive/cloudbeez/cloudloader_core.php in the MailBeez plugin for ZenCart before 3.9.22 allows remote attackers to inject arbitrary web script or HTML via the cloudloader_mode parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2020

CVE-2019-19219

Publication date:
30/04/2020
BMC Control-M/Agent 7.0.00.000 allows Arbitrary File Download.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2020