Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-13410

Publication date:
26/08/2020
An issue was discovered in MoscaJS Aedes 0.42.0. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2022

CVE-2020-16250

Publication date:
26/08/2020
HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2020-16251

Publication date:
26/08/2020
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2020-15484

Publication date:
26/08/2020
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The internal storage of the underlying Linux system stores data in cleartext, without integrity protection against tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2020

CVE-2020-5912

Publication date:
26/08/2020
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the restjavad process's dump command does not follow current best coding practices and may overwrite arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-24316

Publication date:
26/08/2020
WP Plugin Rednumber Admin Menu v1.1 and lower does not sanitize the value of the "role" GET parameter before echoing it back out to the user. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2020-14498

Publication date:
26/08/2020
HMS Industrial Networks AB eCatcher all versions prior to 6.5.5 is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2024

CVE-2020-19007

Publication date:
26/08/2020
Halo blog 1.2.0 allows users to submit comments on blog posts via /api/content/posts/comments. The javascript code supplied by the attacker will then execute in the victim user&amp;#39;s browser.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2020

CVE-2019-18847

Publication date:
26/08/2020
Enterprise Access Client Auto-Updater allows for Remote Code Execution prior to version 2.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2020

CVE-2020-24315

Publication date:
26/08/2020
Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2020-24007

Publication date:
26/08/2020
Umanni RH 1.0 does not limit the number of authentication attempts. An unauthenticated user may exploit this vulnerability to launch a brute-force authentication attack against the Login page.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2020

CVE-2020-24008

Publication date:
26/08/2020
Umanni RH 1.0 has a user enumeration vulnerability. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021