Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-0734

Publication date:
30/10/2018
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-18842

Publication date:
30/10/2018
CSRF exists in zb_users/plugin/AppCentre/theme.js.php in Z-BlogPHP 1.5.2.1935 (Zero), which allows remote attackers to execute arbitrary PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2019

CVE-2018-18832

Publication date:
30/10/2018
admin/check.asp in DKCMS 9.4 allows SQL Injection via an ASPSESSIONID cookie to admin/admin.asp.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18841

Publication date:
30/10/2018
XSS was discovered in SEMCMS PHP V3.4 via the SEMCMS_SeoAndTag.php?Class=edit&CF=SeoAndTag tag_indexkey parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18840

Publication date:
30/10/2018
XSS was discovered in SEMCMS PHP V3.4 via the SEMCMS_SeoAndTag.php?Class=edit&CF=SeoAndTag tag_indexmetatit parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18835

Publication date:
30/10/2018
upload_template() in system/changeskin.php in DocCms 2016.5.12 allows remote attackers to execute arbitrary PHP code via a template file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18834

Publication date:
30/10/2018
An issue has been found in libIEC61850 v1.3. It is a heap-based buffer overflow in BerEncoder_encodeOctetString in mms/asn1/ber_encoder.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-18825

Publication date:
30/10/2018
Pagoda Linux panel V6.0 has XSS via the verification code associated with an invalid account login. A crafted code is mishandled during rendering of the login log.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2018

CVE-2018-18831

Publication date:
30/10/2018
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2018

CVE-2018-18830

Publication date:
30/10/2018
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2018

CVE-2018-18822

Publication date:
30/10/2018
Grapixel New Media v2.0 allows SQL Injection via the pages.aspx pageref parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2018

CVE-2018-18827

Publication date:
30/10/2018
There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018