Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8253

Publication date:
18/09/2020
Improper authentication in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 leads to the ability to access sensitive files.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2020

CVE-2020-8237

Publication date:
18/09/2020
Prototype pollution in json-bigint npm package
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2020

CVE-2020-8251

Publication date:
18/09/2020
Node.js
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8252

Publication date:
18/09/2020
The implementation of realpath in libuv
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8225

Publication date:
18/09/2020
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2022

CVE-2020-8200

Publication date:
18/09/2020
Improper authentication in Citrix StoreFront Server
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2020

CVE-2020-11861

Publication date:
18/09/2020
Unauthorized escalation of local privileges vulnerability on Micro Focus Operation Agent, affecting all versions prior to versions 12.11. The vulnerability could be exploited to escalate the local privileges and gain root access on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8201

Publication date:
18/09/2020
Node.js
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-8158

Publication date:
18/09/2020
Prototype pollution vulnerability in the TypeORM package
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2020-25633

Publication date:
18/09/2020
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9084

Publication date:
18/09/2020
Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a use-after-free (UAF) vulnerability. An authenticated, local attacker may perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2020

CVE-2020-16230

Publication date:
18/09/2020
All version of Ewon Flexy and Cosy prior to 14.1 use wildcards such as (*) under which domains can request resources. An attacker with local access and high privileges could inject scripts into the Cross-origin Resource Sharing (CORS) configuration that could abuse this vulnerability, allowing the attacker to retrieve limited confidential information through sniffing.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2021