Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-26507

Publication date:
05/11/2020
A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the “Notes” functionality in the main screen, an attacker can inject a payload into the “Description” field under the “Insert To-Do” option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the user’s PC.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2020

CVE-2020-26505

Publication date:
05/11/2020
A Stored Cross-Site Scripting (XSS) vulnerability in the “Marmind” web application with version 4.1.141.0 allows an attacker to inject code that will later be executed by legitimate users when they open the assets containing the JavaScript code. This would allow an attacker to perform unauthorized actions in the application on behalf of legitimate users or spread malware via the application. By using the “Assets Upload” function, an attacker can abuse the upload function to upload a malicious PDF file containing a stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2020

CVE-2018-1725

Publication date:
05/11/2020
IBM QRadar SIEM 7.3 and 7.4 n a multi tenant configuration could be vulnerable to information disclosure. IBM X-Force ID: 147440.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2020

CVE-2020-14222

Publication date:
05/11/2020
HCL Digital Experience 8.5, 9.0, 9.5 is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site).
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2020

CVE-2020-4097

Publication date:
05/11/2020
In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2020

CVE-2020-14240

Publication date:
05/11/2020
HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2020

CVE-2020-25398

Publication date:
05/11/2020
CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2020

CVE-2020-26506

Publication date:
05/11/2020
An Authorization Bypass vulnerability in the Marmind web application with version 4.1.141.0 allows users with lower privileges to gain control to files uploaded by administrative users. The accessed files were not visible by the low privileged users in the web GUI.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-25399

Publication date:
05/11/2020
Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-28115

Publication date:
05/11/2020
SQL Injection vulnerability in "Documents component" found in AudimexEE version 14.1.0 allows an attacker to execute arbitrary SQL commands via the object_path parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2020

CVE-2020-28047

Publication date:
05/11/2020
AudimexEE before 14.1.1 is vulnerable to Reflected XSS (Cross-Site-Scripting). If the recommended security configuration parameter "unique_error_numbers" is not set, remote attackers can inject arbitrary web script or HTML via 'action, cargo, panel' parameters that can lead to data leakage.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2020

CVE-2020-27955

Publication date:
05/11/2020
Git LFS 2.12.0 allows Remote Code Execution.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2021