Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12028

Publication date:
20/07/2020
In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2020-12031

Publication date:
20/07/2020
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2021

CVE-2020-8214

Publication date:
20/07/2020
A path traversal vulnerability in servey version
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-8205

Publication date:
20/07/2020
The uppy npm package
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-8215

Publication date:
20/07/2020
A buffer overflow is present in canvas version
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-14494

Publication date:
20/07/2020
OpenClinic GA versions 5.09.02 and 5.89.05b contain an authentication mechanism within the system that does not provide sufficient complexity to protect against brute force attacks, which may allow unauthorized users to access the system after no more than a fixed maximum number of attempts.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2021

CVE-2020-14484

Publication date:
20/07/2020
OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass the system’s account lockout protection, which may allow brute force password attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-14491

Publication date:
20/07/2020
OpenClinic GA versions 5.09.02 and 5.89.05b do not properly check permissions before executing SQL queries, which may allow a low-privilege user to access privileged information.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-14485

Publication date:
20/07/2020
OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass client-side access controls or use a crafted request to initiate a session with limited functionality, which may allow execution of admin functions such as SQL queries.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-12029

Publication date:
20/07/2020
All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2020-4361

Publication date:
20/07/2020
IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information by disclosing private IP addresses in HTTP responses. IBM X-Force ID: 178766.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-4527

Publication date:
20/07/2020
IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the Secure flag for the session cookie in TLS mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. IBM X-Force ID: 182631.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020