Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-16851

Publication date:
11/09/2020
An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.<br /> To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete a targeted file with an elevated status.<br /> The update addresses this vulnerability by correcting where the OneDrive updater performs file writes while running with elevation.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16852

Publication date:
11/09/2020
An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.<br /> To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete a targeted file with an elevated status.<br /> The update addresses this vulnerability by correcting where the OneDrive updater performs file writes while running with elevation.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16855

Publication date:
11/09/2020
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory.<br /> Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office software.<br /> The security update addresses the vulnerability by properly initializing the affected variable.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16857

Publication date:
11/09/2020
A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11. An attacker who successfully exploited this vulnerability could gain remote code execution via server-side script execution on the victim server.<br /> An authenticated attacker with privileges to import and export data could exploit this vulnerability by sending a specially crafted file to a vulnerable Dynamics server.<br /> The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11 handles user input.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-16856

Publication date:
11/09/2020
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br /> To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.<br /> The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0997

Publication date:
11/09/2020
A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br /> Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.<br /> The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0989

Publication date:
11/09/2020
An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files.<br /> To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and access files.<br /> The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0951

Publication date:
11/09/2020
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.<br /> To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.<br /> The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0998

Publication date:
11/09/2020
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.<br /> In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system.<br /> The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0914

Publication date:
11/09/2020
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.<br /> An attacker could exploit this vulnerability by running a specially crafted application on the victim system.<br /> The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0928

Publication date:
11/09/2020
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.<br /> To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.<br /> The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023

CVE-2020-0838

Publication date:
11/09/2020
An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.<br /> To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.<br /> The security update addresses the vulnerability by correcting how NTFS checks access.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2023