Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-15539

Publication date:
05/07/2020
SQL injection can occur in We-com Municipality portal CMS 2.1.x via the cerca/ keywords field.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2020

CVE-2020-15537

Publication date:
05/07/2020
An issue was discovered in the Vanguard plugin 2.1 for WordPress. XSS can occur via the mails/new title field, a product field to the p/ URI, or the Products Search box.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2020

CVE-2020-15536

Publication date:
05/07/2020
An issue was discovered in the bestsoftinc Hotel Booking System Pro plugin through 1.1 for WordPress. Persistent XSS can occur via any of the registration fields.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2020

CVE-2020-15535

Publication date:
05/07/2020
An issue was discovered in the bestsoftinc Car Rental System plugin through 1.3 for WordPress. Persistent XSS can occur via any of the registration fields.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-15540

Publication date:
05/07/2020
We-com OpenData CMS 2.0 allows SQL Injection via the username field on the administrator login page.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2020

CVE-2020-15466

Publication date:
05/07/2020
In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-15528

Publication date:
05/07/2020
An issue was discovered in GOG Galaxy Client 2.0.17. Local escalation of privileges is possible when a user starts or uninstalls a game because of weak file permissions and missing file integrity checks.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15529

Publication date:
05/07/2020
An issue was discovered in GOG Galaxy Client 2.0.17. Local escalation of privileges is possible when a user installs a game or performs a verify/repair operation. The issue exists because of weak file permissions and can be exploited by using opportunistic locks.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15530

Publication date:
05/07/2020
An issue was discovered in Valve Steam Client 2.10.91.91. The installer allows local users to gain NT AUTHORITY\SYSTEM privileges because some parts of %PROGRAMFILES(X86)%\Steam and/or %COMMONPROGRAMFILES(X86)%\Steam have weak permissions during a critical time window. An attacker can make this time window arbitrarily long by using opportunistic locks.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-15523

Publication date:
04/07/2020
In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2022

CVE-2020-7284

Publication date:
03/07/2020
Exposure of Sensitive Information in McAfee Network Security Management (NSM) prior to 10.1.7.7 allows local users to gain unauthorised access to the root account via execution of carefully crafted commands from the restricted command line interface (CLI).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10281

Publication date:
03/07/2020
This vulnerability applies to the Micro Air Vehicle Link (MAVLink) protocol and allows a remote attacker to gain access to sensitive information provided it has access to the communication medium. MAVLink is a header-based protocol that does not perform encryption to improve transfer (and reception speed) and efficiency by design. The increasing popularity of the protocol (used accross different autopilots) has led to its use in wired and wireless mediums through insecure communication channels exposing sensitive information to a remote attacker with ability to intercept network traffic.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021