Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-26150

Publication date:
30/09/2020
info.php in Logaritmo Aware CallManager 2012 allows remote attackers to obtain sensitive information via a direct request, which calls the phpinfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-26160

Publication date:
30/09/2020
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-26148

Publication date:
30/09/2020
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020

CVE-2020-26137

Publication date:
30/09/2020
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2023

CVE-2020-26053

Publication date:
30/09/2020
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-26042

Publication date:
30/09/2020
An issue was discovered in Hoosk CMS v1.8.0. There is a SQL injection vulnerability in install/index.php
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020

CVE-2020-26043

Publication date:
30/09/2020
An issue was discovered in Hoosk CMS v1.8.0. There is a XSS vulnerability in install/index.php
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020

CVE-2020-26041

Publication date:
30/09/2020
An issue was discovered in Hoosk CmS v1.8.0. There is an Remote Code Execution vulnerability in install/index.php
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020

CVE-2020-24569

Publication date:
30/09/2020
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the knximport component via an advanced attack vector, allowing logged in attackers to discover arbitrary information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020

CVE-2020-25763

Publication date:
30/09/2020
Seat Reservation System version 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading PHP files.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2020

CVE-2020-25762

Publication date:
30/09/2020
An issue was discovered in SourceCodester Seat Reservation System 1.0. The file admin_class.php does not perform input validation on the username and password parameters. An attacker can send malicious input in the post request to /admin/ajax.php?action=login and bypass authentication, extract sensitive information etc.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2020

CVE-2020-24721

Publication date:
30/09/2020
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-09-29, as used in COVID-19 applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or disproving an exposure notification, because of the persistent state of a private framework.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2020