Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-20480

Publication date:
26/12/2018
An issue was discovered in S-CMS 1.0. It allows SQL Injection via the js/pic.php P_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-20479

Publication date:
26/12/2018
An issue was discovered in S-CMS 1.0. It allows SQL Injection via the wap_index.php?type=newsinfo S_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-20467

Publication date:
26/12/2018
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2021

CVE-2018-20464

Publication date:
25/12/2018
There is a reflected XSS vulnerability in the CMS Made Simple 2.2.8 admin/myaccount.php. This vulnerability is triggered upon an attempt to modify a user's mailbox with the wrong format. The response contains the user's previously entered email address.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2019

CVE-2018-20465

Publication date:
25/12/2018
Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-20462

Publication date:
25/12/2018
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2019

CVE-2018-20463

Publication date:
25/12/2018
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2019

CVE-2018-20461

Publication date:
25/12/2018
In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting a binary file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-20456

Publication date:
25/12/2018
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-20455

Publication date:
25/12/2018
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash via a stack-based buffer overflow) by crafting an input file, a related issue to CVE-2018-20456.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-20460

Publication date:
25/12/2018
In radare2 prior to 3.1.2, the parseOperands function in libr/asm/arch/arm/armass64.c allows attackers to cause a denial-of-service (application crash caused by stack-based buffer overflow) by crafting an input file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-20457

Publication date:
25/12/2018
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.c, a related issue to CVE-2018-20459.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2020