Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8351

Publication date:
30/11/2020
A privilege escalation vulnerability was reported in Lenovo PCManager prior to version 3.0.50.9162 that could allow an authenticated user to execute code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2020

CVE-2020-29394

Publication date:
30/11/2020
A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2020-6317

Publication date:
30/11/2020
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. This information although sensitive is of limited utility and cannot be used to further access, modify or render unavailable any other information in the cockpit or system. This affects SAP Adaptive Server Enterprise, Versions - 15.7, 16.0.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-29364

Publication date:
30/11/2020
In NetArt News Lister 1.0.0, the news headlines vulnerable to stored xss attacks. Attackers can inject codes in news titles.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2020

CVE-2020-25537

Publication date:
30/11/2020
File upload vulnerability exists in UCMS 1.5.0, and the attacker can take advantage of this vulnerability to obtain server management permission.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2020

CVE-2020-29390

Publication date:
30/11/2020
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2020

CVE-2020-29392

Publication date:
30/11/2020
The Estil Hill Lock Password Manager Safe app 2.3 for iOS has a *#06#* backdoor password. An attacker with physical access can unlock the password manager without knowing the master password set by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-28926

Publication date:
30/11/2020
ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2022

CVE-2020-4900

Publication date:
30/11/2020
IBM Business Automation Workflow 19.0.0.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 190991.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2020

CVE-2020-4626

Publication date:
30/11/2020
IBM Cloud Pak for Security 1.3.0.1 (CP4S) could reveal sensitive information about the internal network to an authenticated user using a specially crafted HTTP request. IBM X-Force ID: 185362.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-4627

Publication date:
30/11/2020
IBM Cloud Pak for Security 1.3.0.1(CP4S) potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 185367.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-4696

Publication date:
30/11/2020
IBM Cloud Pak for Security 1.3.0.1(CP4S) does not invalidate session after logout which could allow an authenticated user to obtain sensitive information from the previous session. IBM X-Force ID: 186789.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2022