Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-7622

Publication date:
06/04/2020
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2021

CVE-2020-1728

Publication date:
06/04/2020
A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8004

Publication date:
06/04/2020
STMicroelectronics STM32F1 devices have Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7631

Publication date:
06/04/2020
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7632

Publication date:
06/04/2020
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7633

Publication date:
06/04/2020
apiconnect-cli-plugins through 6.0.1 is vulnerable to Command Injection.It allows execution of arbitrary commands via the pluginUri argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7634

Publication date:
06/04/2020
heroku-addonpool through 0.1.15 is vulnerable to Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7635

Publication date:
06/04/2020
compass-compile through 0.0.1 is vulnerable to Command Injection.It allows execution of arbitrary commands via tha options argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7636

Publication date:
06/04/2020
adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-7637

Publication date:
06/04/2020
class-transformer before 0.3.1 allow attackers to perform Prototype Pollution. The classToPlainFromExist function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2022

CVE-2020-7638

Publication date:
06/04/2020
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2022

CVE-2020-7639

Publication date:
06/04/2020
eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2022