Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-7979

Publication date:
05/02/2020
GitLab EE 8.9 and later through 12.7.2 has Insecure Permission
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2020

CVE-2020-8114

Publication date:
05/02/2020
GitLab EE 8.9 and later through 12.7.2 has Insecure Permission
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2020

CVE-2020-7216

Publication date:
05/02/2020
An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-8632

Publication date:
05/02/2020
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2022

CVE-2020-5208

Publication date:
05/02/2020
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-5237

Publication date:
05/02/2020
Multiple relative path traversal vulnerabilities in the oneup/uploader-bundle before 1.9.3 and 2.1.5 allow remote attackers to upload, copy, and modify files on the filesystem (potentially leading to arbitrary code execution) via the (1) filename parameter to BlueimpController.php; the (2) dzchunkindex, (3) dzuuid, or (4) filename parameter to DropzoneController.php; the (5) qqpartindex, (6) qqfilename, or (7) qquuid parameter to FineUploaderController.php; the (8) x-file-id or (9) x-file-name parameter to MooUploadController.php; or the (10) name or (11) chunk parameter to PluploadController.php. This is fixed in versions 1.9.3 and 2.1.5.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2021

CVE-2020-8631

Publication date:
05/02/2020
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2021

CVE-2015-2802

Publication date:
04/02/2020
An Information Disclosure vulnerability exists in HP SiteScope 11.2 and 11.3 on Windows, Linux and Solaris, HP Asset Manager 9.30 through 9.32, 9.40 through 9.41, 9.50, and Asset Manager Cloudsystem Chargeback 9.40, which could let a remote malicious user obtain sensitive information. This is the TLS vulnerability known as the RC4 cipher Bar Mitzvah vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2021

CVE-2019-12528

Publication date:
04/02/2020
An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-10786

Publication date:
04/02/2020
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-10787

Publication date:
04/02/2020
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-10788

Publication date:
04/02/2020
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020