Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12764

Publication date:
09/05/2020
Gnuteca 3.8 allows file.php?folder=/&file= Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2020

CVE-2020-12766

Publication date:
09/05/2020
Gnuteca 3.8 allows action=main:search:simpleSearch SQL Injection via the exemplaryStatusId parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2020

CVE-2020-12761

Publication date:
09/05/2020
modules/loaders/loader_ico.c in imlib2 1.6.0 has an integer overflow (with resultant invalid memory allocations and out-of-bounds reads) via an icon with many colors in its color map.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20794

Publication date:
09/05/2020
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-12762

Publication date:
09/05/2020
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2020-12637

Publication date:
09/05/2020
Zulip Desktop before 5.2.0 has Missing SSL Certificate Validation because all validation was inadvertently disabled during an attempt to recognize the ignoreCerts option.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2020

CVE-2020-12755

Publication date:
09/05/2020
fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of a password.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11532

Publication date:
08/05/2020
Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and execute all operations in the context of admin user.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11531

Publication date:
08/05/2020
The DataEngine Xnode Server application in Zoho ManageEngine DataSecurity Plus prior to 6.0.1 does not validate the database schema name when handling a DR-SCHEMA-SYNC request. This allows an authenticated attacker to execute code in the context of the product by writing a JSP file to the webroot directory via directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
18/05/2020

CVE-2020-6616

Publication date:
08/05/2020
Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. This affects, for example, Samsung Galaxy S8, S8+, and Note8 devices with the BCM4361 chipset. The Samsung ID is SVE-2020-16882 (May 2020).
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2023

CVE-2020-11530

Publication date:
08/05/2020
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2020

CVE-2020-11006

Publication date:
08/05/2020
In Shopizer before version 2.11.0, a script can be injected in various forms and saved in the database, then executed when information is fetched from backend. This has been patched in version 2.11.0.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2020