Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-2292

Publication date:
08/10/2020
Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2023

CVE-2020-2288

Publication date:
08/10/2020
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2020-2289

Publication date:
08/10/2020
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2023

CVE-2020-2290

Publication date:
08/10/2020
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2023

CVE-2020-2293

Publication date:
08/10/2020
Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2020-2294

Publication date:
08/10/2020
Jenkins Maven Cascade Release Plugin 1.3.2 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to start cascade builds and layout builds, and reconfigure the plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2020-2295

Publication date:
08/10/2020
A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2020-2287

Publication date:
08/10/2020
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2020-25272

Publication date:
08/10/2020
In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2020-2286

Publication date:
08/10/2020
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2020-26567

Publication date:
08/10/2020
An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2023

CVE-2020-25273

Publication date:
08/10/2020
In SourceCodester Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021