Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-11593

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an HTTP POST request with injected HTML data that is later leveraged to send emails from a customer trusted email address.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2020

CVE-2020-11589

Publication date:
06/04/2020
An Insecure Direct Object Reference issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make a GET request to a certain URL and obtain information that should be provided to authenticated users only.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11590

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an HTTP GET request to HealthPage.aspx and obtain the internal server name.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11591

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an API request and obtain the full application path along with the customer name.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11592

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an API request and get the columns of a specific table within the CIP database.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11594

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an API request that causes a stack error to be shown providing the full file path.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11595

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an API request and obtain the upload folder path that includes the hostname in a UNC path.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11598

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. Upload.ashx allows remote attackers to execute arbitrary code by uploading and executing an ASHX file.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11599

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 6.80 Build 2016031401. GetDistributedPOP3 allows attackers to obtain the username and password of the SMTP user.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11588

Publication date:
06/04/2020
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an HTTP GET request to two files that contain customer data and application paths.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11580

Publication date:
06/04/2020
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, accepts an arbitrary SSL certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2021

CVE-2020-11581

Publication date:
06/04/2020
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, allows a man-in-the-middle attacker to perform OS command injection attacks (against a client) via shell metacharacters to the doCustomRemediateInstructions method, because Runtime.getRuntime().exec() is used.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2021