Home / Early Warning / Vulnerabilities
Subscribe to INCIBE-CERT - Vulnerabilities RSS

Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (http://nvd.nist.gov/) (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used (http://cve.mitre.org/) with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others. Through RSS feeds (https://www.incibe-cert.es/feed/vulnerabilities) or Newsletters (https://www.incibe-cert.es/en/subscriptions) we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-12605

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

CVE-2020-5903

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.

CVE-2020-13380

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
openSIS before 7.4 allows SQL Injection.

CVE-2020-5904

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a cross-site request forgery (CSRF) vulnerability in the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, exists in an undisclosed page.

CVE-2020-13381

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
openSIS through 7.4 allows SQL Injection.

CVE-2020-5905

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
In version 11.6.1-11.6.5.2 of the BIG-IP system Configuration utility Network > WCCP page, the system does not sanitize all user-provided data before display.

CVE-2020-13382

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
openSIS through 7.4 has Incorrect Access Control.

CVE-2020-5906

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
In versions 13.1.0-13.1.3.3, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, the BIG-IP system does not properly enforce the access controls for the scp.blacklist files. This allows Admin and Resource Admin users with Secure Copy (SCP) protocol access to read and overwrite blacklisted files via SCP.

CVE-2020-13383

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
openSIS through 7.4 allows Directory Traversal.

CVE-2020-5907

Severity: 
None
Publication date: 
07/01/2020
Last modified: 
07/01/2020
Description:  
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an authorized user provided with access only to the TMOS Shell (tmsh) may be able to conduct arbitrary file read/writes via the built-in sftp functionality.

Pages