Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-6699

Publication date:
13/03/2020
An improper neutralization of input vulnerability in Fortinet FortiADC 5.3.3 and earlier may allow an attacker to execute a stored Cross Site Scripting (XSS) via a field in the traffic group interface.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2019-16157

Publication date:
13/03/2020
An information exposure vulnerability in Fortinet FortiWeb 6.2.0 CLI and earlier may allow an authenticated user to view sensitive information being logged via diagnose debug commands.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-19756

Publication date:
13/03/2020
An internal product security audit of Lenovo XClarity Administrator (LXCA) discovered Windows OS credentials, used to perform driver updates of managed systems, being written to a log file in clear text. This only affects LXCA version 2.6.0 when performing a Windows driver update. Affected logs are only accessible to authorized users in the First Failure Data Capture (FFDC) service log and log files on LXCA.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2021

CVE-2020-10544

Publication date:
13/03/2020
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2009-5159

Publication date:
13/03/2020
Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2020-1953

Publication date:
13/03/2020
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10541

Publication date:
13/03/2020
Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-10540

Publication date:
13/03/2020
Untis WebUntis before 2020.9.6 allows CSRF for certain combinations of rights and modules.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2020-1887

Publication date:
13/03/2020
Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2020

CVE-2020-10534

Publication date:
12/03/2020
In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-10535

Publication date:
12/03/2020
GitLab 12.8.x before 12.8.6, when sign-up is enabled, allows remote attackers to bypass email domain restrictions within the two-day grace period for an unconfirmed email address.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2020

CVE-2020-1863

Publication date:
12/03/2020
Huawei USG6000V with versions V500R001C20SPC300, V500R003C00SPC100, and V500R005C00SPC100 have an out-of-bounds read vulnerability. Due to a logical flaw in a JSON parsing routine, a remote, unauthenticated attacker could exploit this vulnerability to disrupt service in the affected products.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020