Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-20159

Publication date:
15/12/2018
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a ".zip" file because a ZIP archive is accepted by /admin/?req=modules&action=add as a plugin, and extracted to the main directory. In order for the ".zip" file to be accepted, it must also contain a package.json file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2019

CVE-2018-20157

Publication date:
15/12/2018
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2019

CVE-2018-20154

Publication date:
14/12/2018
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2019

CVE-2018-20156

Publication date:
14/12/2018
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated "site administrator" users to execute arbitrary PHP code throughout a multisite network.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2019

CVE-2018-20155

Publication date:
14/12/2018
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-20148

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20149

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20150

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, crafted URLs could trigger XSS for certain use cases involving plugins.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20153

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20151

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20152

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2019

CVE-2018-20147

Publication date:
14/12/2018
In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020