Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10028

Publication date:
11/05/2020
Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2020

CVE-2020-10058

Publication date:
11/05/2020
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2020

CVE-2020-10059

Publication date:
11/05/2020
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2020

CVE-2020-1724

Publication date:
11/05/2020
A flaw was found in Keycloak in versions before 9.0.2. This flaw allows a malicious user that is currently logged in, to see the personal information of a previously logged out user in the account manager section.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9840

Publication date:
11/05/2020
In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020

CVE-2020-5833

Publication date:
11/05/2020
Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020

CVE-2020-7647

Publication date:
11/05/2020
All versions before 1.6.7 and all versions after 2.0.0 inclusive and before 2.8.2 of io.jooby:jooby and org.jooby:jooby are vulnerable to Directory Traversal via two separate vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-5834

Publication date:
11/05/2020
Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to a directory traversal attack that could allow a remote actor to determine the size of files in the directory.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020

CVE-2020-5835

Publication date:
11/05/2020
Symantec Endpoint Protection Manager, prior to 14.3, has a race condition in client remote deployment which may result in an elevation of privilege on the remote machine.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020

CVE-2020-5837

Publication date:
11/05/2020
Symantec Endpoint Protection, prior to 14.3, may not respect file permissions when writing to log files that are replaced by symbolic links, which can lead to a potential elevation of privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020

CVE-2020-5836

Publication date:
11/05/2020
Symantec Endpoint Protection, prior to 14.3, can potentially reset the ACLs on a file as a limited user while Symantec Endpoint Protection's Tamper Protection feature is disabled.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-12790

Publication date:
11/05/2020
In the SEOmatic plugin before 3.2.49 for Craft CMS, helpers/DynamicMeta.php does not properly sanitize the URL. This leads to Server-Side Template Injection and credentials disclosure via a crafted Twig template after a semicolon.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2020