Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-28364

Publication date:
09/11/2020
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2020

CVE-2020-4651

Publication date:
09/11/2020
IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2020

CVE-2020-4650

Publication date:
09/11/2020
IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-27977

Publication date:
09/11/2020
CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2020

CVE-2020-26542

Publication date:
09/11/2020
An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server when using the SimpleLDAP authentication in conjunction with Microsoft’s Active Directory, Percona has discovered a flaw that would allow authentication to complete when passing a blank value for the account password, leading to access against the service integrated with which Active Directory is deployed at the level granted to the authenticating account.
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2020

CVE-2020-23138

Publication date:
09/11/2020
An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2020

CVE-2020-23140

Publication date:
09/11/2020
Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2020

CVE-2020-23139

Publication date:
09/11/2020
Microweber 1.1.18 is affected by broken authentication and session management. Local session hijacking may occur, which could result in unauthorized access to system data or functionality, or a complete system compromise.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2020

CVE-2020-23136

Publication date:
09/11/2020
Microweber v1.1.18 is affected by no session expiry after log-out.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2020

CVE-2020-14366

Publication date:
09/11/2020
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-9299

Publication date:
09/11/2020
There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2020

CVE-2020-9300

Publication date:
09/11/2020
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2020