Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-18856

Publication date:
20/11/2018
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "openvpncmd" parameter as a shell command.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2020

CVE-2018-18857

Publication date:
20/11/2018
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "command_line" parameter as a shell command.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2020

CVE-2018-18864

Publication date:
20/11/2018
Loadbalancer.org Enterprise VA MAX before 8.3.3 has XSS because Apache HTTP Server logs are displayed.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-18715

Publication date:
20/11/2018
Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2021

CVE-2018-18716

Publication date:
20/11/2018
Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2021

CVE-2018-18772

Publication date:
20/11/2018
CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.740 allows CSRF via admin/index.php?module=send_ssh, as demonstrated by executing an arbitrary OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2023

CVE-2018-18773

Publication date:
20/11/2018
CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.740 allows CSRF via admin/index.php?module=rootpwd, as demonstrated by changing the root password.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2023

CVE-2018-18774

Publication date:
20/11/2018
CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.740 allows XSS via the admin/index.php module parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2023

CVE-2018-18865

Publication date:
20/11/2018
The Royal browser extensions TS before 4.3.60728 (Release Date 2018-07-28) and TSX before 3.3.1 (Release Date 2018-09-13) allow Credentials Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2018-18565

Publication date:
20/11/2018
An issue was discovered in Roche Accu-Chek Inform II Instrument before 03.06.00 (Serial number below 14000) and 04.x before 04.03.00 (Serial Number above 14000), CoaguChek Pro II before 04.03.00, CoaguChek XS Plus before 03.01.06, CoaguChek XS Pro before 03.01.06, cobas h 232 before 03.01.03 (Serial number below KQ0400000 or KS0400000), and cobas h 232 before 04.00.04 (Serial number above KQ0400000 or KS0400000). A vulnerability in the software update mechanism allows authenticated attackers in the adjacent network to overwrite arbitrary files on the system through a crafted update package.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2018

CVE-2018-16224

Publication date:
20/11/2018
Incorrect access control for the diagnostic files of the iSmartAlarm Cube One through 2.2.4.10 allows an attacker to retrieve them via a specifically crafted TCP request to port 12345 and 22306, and access sensitive information from the device.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2018

CVE-2018-12037

Publication date:
20/11/2018
An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in "ATA high" mode, not vulnerable in "TCG" or "ATA max" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019