Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12480

Publication date:
17/08/2020
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2020-1574

Publication date:
17/08/2020
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.<br /> Exploitation of the vulnerability requires that a program process a specially crafted image file.<br /> The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1577

Publication date:
17/08/2020
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.<br /> There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.<br /> The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1578

Publication date:
17/08/2020
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.<br /> To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.<br /> The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1579

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1581

Publication date:
17/08/2020
An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execute code on the system.<br /> An attacker could exploit this vulnerability by running a specially crafted application on the victim system.<br /> The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1582

Publication date:
17/08/2020
A remote code execution vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br /> Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.<br /> The security update addresses the vulnerability by correcting how Microsoft Access handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1583

Publication date:
17/08/2020
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data.<br /> To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created.<br /> The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1584

Publication date:
17/08/2020
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.<br /> To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.<br /> The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1585

Publication date:
17/08/2020
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<br /> Exploitation of the vulnerability requires that a program process a specially crafted image file.<br /> The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1587

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows Ancillary Function Driver for WinSock handles memory.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2020-1597

Publication date:
17/08/2020
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.<br /> A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.<br /> The update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024