Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-16881

Publication date:
11/09/2020
A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious &amp;#39;package.json&amp;#39; file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<br /> To exploit this vulnerability, an attacker would need to convince a target to clone a repository and open it in Visual Studio Code. Attacker-specified code would execute when the target opens the malicious &amp;#39;package.json&amp;#39; file.<br /> The update address the vulnerability by modifying the way Visual Studio Code handles JSON files.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16884

Publication date:
11/09/2020
A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.<br /> In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker&amp;#39;s website, or by opening an attachment sent through email. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<br /> The security update addresses the vulnerability by modifying how the IEToEdge BHO plug-in handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16860

Publication date:
11/09/2020
A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the server fails to properly sanitize web requests to an affected Dynamics server. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SQL service account.<br /> An authenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable Dynamics server.<br /> The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 (on-premises) validates and sanitizes user input.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16862

Publication date:
11/09/2020
A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the server fails to properly sanitize web requests to an affected Dynamics server. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SQL service account.<br /> An authenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable Dynamics server.<br /> The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 (on-premises) validates and sanitizes user input.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16874

Publication date:
11/09/2020
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br /> To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.<br /> The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16875

Publication date:
11/09/2020
A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.<br /> An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.<br /> The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16879

Publication date:
11/09/2020
An information disclosure vulnerability exists when a Windows Projected Filesystem improperly handles file redirections. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user&amp;#39;s system<br /> To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability.<br /> The security update addresses the vulnerability by correcting how Windows Projected Filesystem handle file redirections.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-1031

Publication date:
11/09/2020
An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory.<br /> To exploit the vulnerability, an unauthenticated attacker could send a specially crafted packet to an affected DHCP server. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.<br /> The security update addresses the vulnerability by correcting how DHCP servers initializes memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16873

Publication date:
11/09/2020
A spoofing vulnerability manifests in Microsoft Xamarin.Forms due to the default settings on Android WebView version prior to 83.0.4103.106. This vulnerability could allow an attacker to execute arbitrary Javascript code on a target system.<br /> For the attack to be successful, the targeted user would need to browse to a malicious website or a website serving the malicious code through Xamarin.Forms.<br /> The security update addresses this vulnerability by preventing the malicious Javascript from running in the WebView.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16854

Publication date:
11/09/2020
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.<br /> To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.<br /> The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16858

Publication date:
11/09/2020
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.<br /> The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim&amp;#39;s identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.<br /> The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16853

Publication date:
11/09/2020
An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.<br /> To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete a targeted file with an elevated status.<br /> The update addresses this vulnerability by correcting where the OneDrive updater performs file writes while running with elevation.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023