Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-4701

Publication date:
19/11/2020
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2020

CVE-2020-11829

Publication date:
19/11/2020
Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11831

Publication date:
19/11/2020
OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-11830

Publication date:
19/11/2020
QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2020

CVE-2020-28054

Publication date:
19/11/2020
JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15710

Publication date:
19/11/2020
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2020

CVE-2019-20933

Publication date:
19/11/2020
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2022

CVE-2020-8279

Publication date:
19/11/2020
Missing validation of server certificates for out-going connections in Nextcloud Social
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2020

CVE-2020-8278

Publication date:
19/11/2020
Improper access control in Nextcloud Social app version 0.3.1 allowed to read posts of any user.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2020

CVE-2020-5947

Publication date:
19/11/2020
In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE).
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2020

CVE-2020-8277

Publication date:
19/11/2020
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-13356

Publication date:
19/11/2020
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.8.9. A specially crafted request could bypass Multipart protection and read files in certain specific paths on the server. Affected versions are: >=8.8.9, =13.4, =13.5,
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2020