Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-14001

Publication date:
17/07/2020
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14039

Publication date:
17/07/2020
In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14928

Publication date:
17/07/2020
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7825

Publication date:
17/07/2020
A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-7826

Publication date:
17/07/2020
EyeSurfer BflyInstallerX.ocx v1.0.0.16 and earlier versions contain a vulnerability that could allow remote files to be download by setting the arguments to the vulnerable method. This can be leveraged for code execution. When the vulnerable method is called, they fail to properly check the parameters that are passed to it.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-15807

Publication date:
17/07/2020
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-4464

Publication date:
17/07/2020
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to execute arbitrary code on a system with a specially-crafted sequence of serialized objects over the SOAP connector. IBM X-Force ID: 181489.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-7696

Publication date:
17/07/2020
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-7684

Publication date:
17/07/2020
This affects all versions of package rollup-plugin-serve. There is no path sanitization in readFile operation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-15801

Publication date:
17/07/2020
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The ._pth file (e.g., the python._pth file) is not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2022

CVE-2020-15803

Publication date:
17/07/2020
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9682

Publication date:
17/07/2020
Adobe Creative Cloud Desktop Application versions 5.1 and earlier have a symlink vulnerability vulnerability. Successful exploitation could lead to arbitrary file system write.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2021