Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-26246

Publication date:
03/12/2020
Pimcore is an open source digital experience platform. In Pimcore before version 6.8.5 it is possible to modify & create website settings without having the appropriate permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2020

CVE-2020-29282

Publication date:
02/12/2020
SQL injection vulnerability in BloodX 1.0 allows attackers to bypass authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29285

Publication date:
02/12/2020
SQL injection vulnerability was discovered in Point of Sales in PHP/PDO 1.0, which can be exploited via the id parameter to edit_category.php.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29284

Publication date:
02/12/2020
The file view-chair-list.php in Multi Restaurant Table Reservation System 1.0 does not perform input validation on the table_id parameter which allows unauthenticated SQL Injection. An attacker can send malicious input in the GET request to /dashboard/view-chair-list.php?table_id= to trigger the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29283

Publication date:
02/12/2020
An SQL injection vulnerability was discovered in Online Doctor Appointment Booking System PHP and Mysql via the q parameter to getuser.php.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29279

Publication date:
02/12/2020
PHP remote file inclusion in the assign_resume_tpl method in Application/Common/Controller/BaseController.class.php in 74CMS before 6.0.48 allows remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29287

Publication date:
02/12/2020
An SQL injection vulnerability was discovered in Car Rental Management System v1.0 can be exploited via the id parameter in view_car.php or the car_id parameter in booking.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2020

CVE-2020-29288

Publication date:
02/12/2020
An SQL injection vulnerability was discovered in Gym Management System In manage_user.php file, GET parameter 'id' is vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2020-29280

Publication date:
02/12/2020
The Victor CMS v1.0 application is vulnerable to SQL injection via the 'search' parameter on the search.php page.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2020

CVE-2020-26244

Publication date:
02/12/2020
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2020

CVE-2020-28206

Publication date:
02/12/2020
An issue was discovered in Bitrix24 Bitrix Framework (1c site management) 20.0. An "User enumeration and Improper Restriction of Excessive Authentication Attempts" vulnerability exists in the admin login form, allowing a remote user to enumerate users in the administrator group. This also allows brute-force attacks on the passwords of users not in the administrator group.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2017-14451

Publication date:
02/12/2020
An exploitable out-of-bounds read vulnerability exists in libevm (Ethereum Virtual Machine) of CPP-Ethereum. A specially crafted smart contract code can cause an out-of-bounds read which can subsequently trigger an out-of-bounds write resulting in remote code execution. An attacker can create/send malicious smart contract to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2020