Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-14364

Publication date:
31/08/2020
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7524

Publication date:
31/08/2020
Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when sending specific crafted IPV4 packet to the controller: Sending a specific IPv4 protocol package to Schneider Electric Modicon M218 Logic Controller can cause IPv4 devices to go down. The device does not work properly and must be powered back on to return to normal.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2022

CVE-2020-7523

Publication date:
31/08/2020
Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see security notification for versions) which could cause local privilege escalation when the Modbus Serial Driver service is invoked. The driver does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2021

CVE-2020-7527

Publication date:
31/08/2020
Incorrect Default Permission vulnerability exists in SoMove (V2.8.1) and prior which could cause elevation of privilege and provide full access control to local system users to SoMove component and services when a SoMove installer script is launched.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2020-7526

Publication date:
31/08/2020
Improper Input Validation vulnerability exists in PowerChute Business Edition (software V9.0.x and earlier) which could cause remote code execution when a script is executed during a shutdown event.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2020-7525

Publication date:
31/08/2020
Improper Restriction of Excessive Authentication Attempts vulnerability exists in all hardware versions of spaceLYnk and Wiser for KNX (formerly homeLYnk) which could allow an attacker to guess a password when brute force is used.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2020-7522

Publication date:
31/08/2020
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in SFAPV9601 - APC Easy UPS On-Line Software (V2.0 and earlier) when accessing a vulnerable method of `SoundUploadServlet` which may lead to uploading executable files to non-specified directories.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2020-7521

Publication date:
31/08/2020
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in SFAPV9601 - APC Easy UPS On-Line Software (V2.0 and earlier) when accessing a vulnerable method of `FileUploadServlet` which may lead to uploading executable files to non-specified directories.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2020-20628

Publication date:
31/08/2020
controller/controller-comments.php in WP GDPR plugin through 2.1.1 has unauthenticated stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2020

CVE-2020-20627

Publication date:
31/08/2020
The includes/gateways/stripe/includes/admin/admin-actions.php in GiveWP plugin through 2.5.9 for WordPress allows unauthenticated settings change.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2023

CVE-2020-20626

Publication date:
31/08/2020
lara-google-analytics.php in Lara Google Analytics plugin through 2.0.4 for WordPress allows authenticated stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2020

CVE-2020-24699

Publication date:
31/08/2020
The Chamber Dashboard Business Directory plugin 3.2.8 for WordPress allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020