Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-1901

Publication date:
06/10/2020
Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2020

CVE-2020-1902

Publication date:
06/10/2020
A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2021

CVE-2020-15174

Publication date:
06/10/2020
In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2021

CVE-2020-15215

Publication date:
06/10/2020
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2020

CVE-2019-4326

Publication date:
06/10/2020
"HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header."
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2020

CVE-2019-4325

Publication date:
06/10/2020
"HCL AppScan Enterprise makes use of broken or risky cryptographic algorithm to store REST API user details."
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2020

CVE-2020-4528

Publication date:
06/10/2020
IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-4725

Publication date:
06/10/2020
IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020

CVE-2020-26582

Publication date:
06/10/2020
D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-25743

Publication date:
06/10/2020
hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2020

CVE-2020-25742

Publication date:
06/10/2020
pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2020

CVE-2020-25862

Publication date:
06/10/2020
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023