Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-9592

Publication date:
25/06/2020
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-9666

Publication date:
25/06/2020
Adobe Campaign Classic before 20.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2020

CVE-2020-15302

Publication date:
25/06/2020
In Argent RecoveryManager before 0xdc350d09f71c48c5D22fBE2741e4d6A03970E192, the executeRecovery function does not require any signatures in the zero-guardian case, which allows attackers to cause a denial of service (locking) or a takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-4072

Publication date:
25/06/2020
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2020

CVE-2019-19505

Publication date:
25/06/2020
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2019-19506

Publication date:
25/06/2020
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the "homeplugd" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2020

CVE-2020-9437

Publication date:
25/06/2020
SecureAuth.aspx in SecureAuth IdP 9.3.0 suffers from a client-side template injection that allows for script execution, in the same manner as XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
06/07/2020

CVE-2019-16213

Publication date:
25/06/2020
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2020

CVE-2020-10994

Publication date:
25/06/2020
In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10378

Publication date:
25/06/2020
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10379

Publication date:
25/06/2020
In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10177

Publication date:
25/06/2020
Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023