Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-7919

Publication date:
16/03/2020
Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7248

Publication date:
16/03/2020
libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2023

CVE-2020-9472

Publication date:
16/03/2020
Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2017-12842

Publication date:
16/03/2020
Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2020

CVE-2019-19461

Publication date:
16/03/2020
Post-authentication Stored XSS in Team Password Manager through 7.93.204 allows attackers to steal other users' credentials by creating a shared password with HTML code as the title.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2020-9471

Publication date:
16/03/2020
Umbraco Cloud 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Packages functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2019-19937

Publication date:
16/03/2020
In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to "undesirable results."
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18917

Publication date:
16/03/2020
A potential security vulnerability has been identified for certain HP Printers and All-in-Ones that would allow bypassing account lockout.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19212

Publication date:
16/03/2020
Dolibarr ERP/CRM 3.0 through 10.0.3 allows XSS via the qty parameter to product/fournisseurs.php (product price screen).
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2020-7608

Publication date:
16/03/2020
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2022

CVE-2018-19325

Publication date:
16/03/2020
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14466. Reason: This candidate is a duplicate of CVE-2018-14466. Notes: All CVE users should reference CVE-2018-14466 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-11073

Publication date:
16/03/2020
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020