Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17655

Publication date:
16/06/2020
A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2021

CVE-2020-7510

Publication date:
16/06/2020
A CWE-200: Information Exposure vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow attacker to obtain private keys.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2020-7511

Publication date:
16/06/2020
A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to acquire a password by brute force.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2020-7502

Publication date:
16/06/2020
A CWE-787: Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (Firmware version 4.3 and prior), which may cause a Denial of Service when specific TCP/IP crafted packets are sent to the Modicon M218 Logic Controller.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2020-7503

Publication date:
16/06/2020
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to execute malicious commands on behalf of a legitimate user when xsrf-token data is intercepted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7507

Publication date:
16/06/2020
A CWE-400: Uncontrolled Resource Consumption vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to login multiple times resulting in a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7513

Publication date:
16/06/2020
A CWE-312: Cleartext Storage of Sensitive Information vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to intercept traffic and read configuration data.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7504

Publication date:
16/06/2020
A CWE-20: Improper Input Validation vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to disable the webserver service on the device when specially crafted network packets are sent.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7505

Publication date:
16/06/2020
A CWE-494 Download of Code Without Integrity Check vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to inject data with dangerous content into the firmware and execute arbitrary code on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7508

Publication date:
16/06/2020
A CWE-307 Improper Restriction of Excessive Authentication Attempts vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to gain full access by brute force.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7509

Publication date:
16/06/2020
A CWE-269: Improper privilege management (write) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to elevate their privileges and delete files.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2020

CVE-2020-7512

Publication date:
16/06/2020
A CWE-1103: Use of Platform-Dependent Third Party Components with vulnerabilities vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to exploit the component.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2020