Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8142

Publication date:
03/04/2020
A security restriction bypass vulnerability has been discovered in Revive Adserver version
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2020

CVE-2020-8147

Publication date:
03/04/2020
Flaw in input validation in npm package utils-extend version 1.0.8 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using utils-extend.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-8143

Publication date:
03/04/2020
An Open Redirect vulnerability was discovered in Revive Adserver version
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-8639

Publication date:
03/04/2020
An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2021

CVE-2020-8637

Publication date:
03/04/2020
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-8638

Publication date:
03/04/2020
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-6994

Publication date:
03/04/2020
A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2021

CVE-2020-10601

Publication date:
03/04/2020
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or overwriting the password hash.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2021

CVE-2020-7008

Publication date:
03/04/2020
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow input passed in the URL that is not properly verified before use, which may allow an attacker to read arbitrary files from local resources.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-7004

Publication date:
03/04/2020
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next time a privileged user runs the application.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-7000

Publication date:
03/04/2020
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow an unauthenticated attacker to discover the cryptographic key from the web server and gain information about the login and the encryption/decryption mechanism, which may be exploited to bypass authentication of the HTML5 HMI web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020

CVE-2020-10599

Publication date:
03/04/2020
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow a vulnerable ActiveX component to be exploited resulting in a buffer overflow, which may lead to a denial-of-service condition and execution of arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2020