Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-20160

Publication date:
15/06/2022
Product: AndroidVersions: Android kernelAndroid ID: A-210083655References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2022

CVE-2022-20164

Publication date:
15/06/2022
Product: AndroidVersions: Android kernelAndroid ID: A-204891956References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2022

CVE-2022-20154

Publication date:
15/06/2022
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20162

Publication date:
15/06/2022
In asn1_p256_int of crypto/asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223492713References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20165

Publication date:
15/06/2022
In asn1_parse of asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220868345References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20166

Publication date:
15/06/2022
In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20140

Publication date:
15/06/2022
In read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-227618988
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20142

Publication date:
15/06/2022
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2021-39806

Publication date:
15/06/2022
In closef of label_backends_android.c, there is a possible way to corrupt memory due to a double free. This could lead to local escalation of privilege during startup of servicemanager, if an attacker can trigger an initialization failure, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215387420
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20145

Publication date:
15/06/2022
In startLegacyVpnPrivileged of Vpn.java, there is a possible way to retrieve VPN credentials due to a protocol downgrade attack. This could lead to remote escalation of privilege if a malicious Wi-Fi AP is used, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-201660636
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20156

Publication date:
15/06/2022
In unflatten of GraphicBuffer.cpp, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212803946References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022

CVE-2022-20155

Publication date:
15/06/2022
In ipu_core_jqs_msg_transport_kernel_write_sync of ipu-core-jqs-msg-transport.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176754369References: N/A
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2022