Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-5131

Publication date:
17/07/2020
SonicWall NetExtender Windows client vulnerable to arbitrary file write vulnerability, this allows attacker to overwrite a DLL and execute code with the same privilege in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 9.0.815 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-5130

Publication date:
17/07/2020
SonicOS SSLVPN LDAP login request allows remote attackers to cause external service interaction (DNS) due to improper validation of the request. This vulnerability impact SonicOS version 6.5.4.4-44n and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-15586

Publication date:
17/07/2020
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14001

Publication date:
17/07/2020
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14039

Publication date:
17/07/2020
In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-14928

Publication date:
17/07/2020
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7825

Publication date:
17/07/2020
A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020

CVE-2020-7826

Publication date:
17/07/2020
EyeSurfer BflyInstallerX.ocx v1.0.0.16 and earlier versions contain a vulnerability that could allow remote files to be download by setting the arguments to the vulnerable method. This can be leveraged for code execution. When the vulnerable method is called, they fail to properly check the parameters that are passed to it.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-15807

Publication date:
17/07/2020
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-4464

Publication date:
17/07/2020
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to execute arbitrary code on a system with a specially-crafted sequence of serialized objects over the SOAP connector. IBM X-Force ID: 181489.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-7696

Publication date:
17/07/2020
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2020

CVE-2020-7684

Publication date:
17/07/2020
This affects all versions of package rollup-plugin-serve. There is no path sanitization in readFile operation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020