Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-11660

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows privileged users to view restricted sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11659

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows privileged users to perform a restricted user administration action.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2020

CVE-2020-11658

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier handles shared secret keys in an insecure manner, which allows attackers to bypass authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2020

CVE-2020-11666

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows malicious users to elevate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11665

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier handles loginRedirect page redirects in an insecure manner, which allows attackers to perform open redirect attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2020

CVE-2020-3161

Publication date:
15/04/2020
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2020-11661

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows privileged users to view and edit user data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11662

Publication date:
15/04/2020
CA API Developer Portal 4.3.1 and earlier handles requests insecurely, which allows remote attackers to exploit a Cross-Origin Resource Sharing flaw and access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2020-10951

Publication date:
15/04/2020
Western Digital My Cloud Home and ibi devices before 2.2.0 allow clickjacking on sign-in pages.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2023

CVE-2019-20679

Publication date:
15/04/2020
NETGEAR MR1100 devices before 12.06.08.00 are affected by lack of access control at the function level.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20680

Publication date:
15/04/2020
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000v2 before 1.0.0.53, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.60, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.46, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.32.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-20681

Publication date:
15/04/2020
Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.34, D7000 before 1.0.1.68, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6050 before 1.0.1.18, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, and R6900v2 before 1.2.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021