Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-25833

Publication date:
17/11/2020
Persistent cross-Site Scripting vulnerability on Micro Focus IDOL product, affecting all version prior to version 12.7. The vulnerability could be exploited to perform Persistent XSS attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-25832

Publication date:
17/11/2020
Reflected Cross Site scripting vulnerability on Micro Focus Filr product, affecting version 4.2.1. The vulnerability could be exploited to perform Reflected XSS attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-27192

Publication date:
17/11/2020
BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11851

Publication date:
17/11/2020
Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in the execution of arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-10776

Publication date:
17/11/2020
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2020

CVE-2020-26406

Publication date:
17/11/2020
Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. Affected versions are: >=13.3, =13.4, =13.5,
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2020

CVE-2020-13358

Publication date:
17/11/2020
A vulnerability in the internal Kubernetes agent api in GitLab CE/EE version 13.3 and above allows unauthorized access to private projects. Affected versions are: >=13.4, =13.3, =13.5,
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-13354

Publication date:
17/11/2020
A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 12.6. The container registry name check could cause exponential number of backtracks for certain user supplied values resulting in high CPU usage. Affected versions are: >=12.6,
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2020

CVE-2020-11860

Publication date:
17/11/2020
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS)
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-13352

Publication date:
17/11/2020
Private group info is leaked leaked in GitLab CE/EE version 10.2 and above, when the project is moved from private to public group. Affected versions are: >=10.2, =13.4, =13.5,
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2020

CVE-2020-13353

Publication date:
17/11/2020
When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above.
Severity CVSS v4.0: Pending analysis
Last modification:
13/06/2022

CVE-2020-25834

Publication date:
17/11/2020
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting version 7.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023