Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-1541

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1509

Publication date:
17/08/2020
An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system&amp;#39;s LSASS service.<br /> The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1510

Publication date:
17/08/2020
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.<br /> To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.<br /> The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1511

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.<br /> An attacker could exploit this vulnerability by running a specially crafted application on the victim system.<br /> The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1512

Publication date:
17/08/2020
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.<br /> An attacker could exploit this vulnerability by running a specially crafted application on the victim system.<br /> The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1513

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1515

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows Telephony Server handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1516

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1517

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1518

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1519

Publication date:
17/08/2020
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.<br /> To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.<br /> The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2020-1520

Publication date:
17/08/2020
A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.<br /> An attacker who successfully exploited the vulnerability would gain execution on a victim system.<br /> The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026