Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15080

Publication date:
30/12/2020
An issue was discovered in a smart contract implementation for MORPH Token through 2019-06-05, an Ethereum token. A typo in the constructor of the Owned contract (which is inherited by MORPH Token) allows attackers to acquire contract ownership. A new owner can subsequently obtain MORPH Tokens for free and can perform a DoS attack.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2019-12768

Publication date:
30/12/2020
An issue was discovered on D-Link DAP-1650 devices through v1.03b07 before 1.04B02_J65H Hot Fix. Attackers can bypass authentication via forceful browsing.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-12953

Publication date:
30/12/2020
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-27848

Publication date:
30/12/2020
dotCMS before 20.10.1 allows SQL injection, as demonstrated by the /api/v1/containers orderby parameter. The PaginatorOrdered classes that are used to paginate results of a REST endpoints do not sanitize the orderBy parameter and in some cases it is vulnerable to SQL injection attacks. A user must be an authenticated manager in the dotCMS system to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-28365

Publication date:
30/12/2020
Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2020-28736

Publication date:
30/12/2020
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-28925

Publication date:
30/12/2020
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-29228

Publication date:
30/12/2020
EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by SQL injection in the User Login Page.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-29230

Publication date:
30/12/2020
EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by cross-site scripting (XSS) in the Admin Panel - Manage User tab using the Full Name of the user. This vulnerability can result in the attacker injecting the XSS payload in the User Registration section and each time admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie according to the crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-28735

Publication date:
30/12/2020
Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-29231

Publication date:
30/12/2020
EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by cross-site scripting (XSS) in the Admin Profile Page. This vulnerability can result in the attacker injecting the XSS payload in Admin Full Name and each time admin visits the Profile page from the admin panel, the XSS triggers.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021

CVE-2020-28734

Publication date:
30/12/2020
Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2021