Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-24986

Publication date:
04/09/2020
Concrete5 up to and including 8.5.2 allows Unrestricted Upload of File with Dangerous Type such as a .php file via File Manager. It is possible to modify site configuration to upload the PHP file and execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2021

CVE-2020-24963

Publication date:
04/09/2020
An Authenticated Persistent XSS vulnerability was discovered in the Best Support System, tested version v3.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14008

Publication date:
04/09/2020
Zoho ManageEngine Applications Manager 14710 and before allows an authenticated admin user to upload a vulnerable jar in a specific location, which leads to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2020

CVE-2020-24659

Publication date:
04/09/2020
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-4702

Publication date:
04/09/2020
IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187187.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2020

CVE-2020-4632

Publication date:
04/09/2020
IBM InfoSphere Metadata Asset Manager 11.7 is vulnerable to server-side request forgery. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to submit or control server requests. IBM X-Force ID: 185416.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2020

CVE-2020-4545

Publication date:
04/09/2020
IBM Aspera Connect 3.9.9 could allow a remote attacker to execute arbitrary code on the system, caused by improper loading of Dynamic Link Libraries by the import feature. By persuading a victim to open a specially-crafted .DLL file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183190.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2020

CVE-2020-7299

Publication date:
04/09/2020
Cleartext Storage of Sensitive Information in Memory vulnerability in Microsoft Windows client in McAfee True Key (TK) prior to 6.2.109.2 allows a local user logged in with administrative privileges to access to another user’s passwords on the same machine via triggering a process dump in specific situations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3881

Publication date:
04/09/2020
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2020-7119

Publication date:
04/09/2020
A vulnerability exists in the Aruba Analytics and Location Engine (ALE) web management interface 2.1.0.2 and earlier firmware that allows an already authenticated administrative user to arbitrarily modify files as an underlying privileged operating system user.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2020

CVE-2020-7730

Publication date:
04/09/2020
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-23834

Publication date:
04/09/2020
Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2020