Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12835

Publication date:
20/05/2020
An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-13152

Publication date:
20/05/2020
A remote user can create a specially crafted M3U file, media playlist file that when loaded by the target user, will trigger a memory leak, whereby Amarok 2.8.0 continue to waste resources over time, eventually allows attackers to cause a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2022

CVE-2020-4461

Publication date:
20/05/2020
IBM Security Access Manager Appliance 9.0.7.1 could allow an authenticated user to bypass security by allowing id_token claims manipulation without verification. IBM X-Force ID: 181481.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-13226

Publication date:
20/05/2020
WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2020

CVE-2020-5579

Publication date:
20/05/2020
SQL injection vulnerability in the Paid Memberships versions prior to 2.3.3 allows attacker with administrator rights to execute arbitrary SQL commands via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2021

CVE-2019-5997

Publication date:
20/05/2020
Video Insight VMS versions prior to 7.6.1 allow remote attackers to conduct code injection attacks via unspecified vectors.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2019-11048

Publication date:
20/05/2020
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-13225

Publication date:
20/05/2020
phpIPAM 1.4 contains a stored cross site scripting (XSS) vulnerability within the Edit User Instructions field of the User Instructions widget.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2020

CVE-2020-9753

Publication date:
20/05/2020
Whale Browser Installer before 1.2.0.5 versions don&amp;#39;t support signature verification for Flash installer.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2020

CVE-2020-12034

Publication date:
20/05/2020
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable.The EDS subsystem does not provide adequate input sanitation, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This can lead to denial-of-service conditions.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2020

CVE-2020-7137

Publication date:
19/05/2020
A validation issue in HPE Superdome Flex&amp;#39;s RMC component may allow local elevation of privilege. Apply HPE Superdome Flex Server version 3.25.46 or later to resolve this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2020

CVE-2020-7138

Publication date:
19/05/2020
Potential remote code execution security vulnerabilities have been identified with HPE Nimble Storage systems that could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.3.0 4.5.6.0 5.0.9.0 5.1.4.100
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021