Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1227

Publication date:
29/04/2022
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2024

CVE-2021-43938

Publication date:
29/04/2022
Elcomplus SmartPTT SCADA Server is vulnerable to an unauthenticated user can request various files from the server without any authentication or authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2022-1249

Publication date:
29/04/2022
A NULL pointer dereference flaw was found in pesign's cms_set_pw_data() function of the cms_common.c file. The function fails to handle the NULL pwdata invocation from daemon.c, which leads to an explicit NULL dereference and crash on all attempts to daemonize pesign.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-29856

Publication date:
29/04/2022
A hardcoded cryptographic key in Automation360 22 allows an attacker to decrypt exported RPA packages.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-1015

Publication date:
29/04/2022
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2023

CVE-2021-39082

Publication date:
29/04/2022
IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2021-43937

Publication date:
29/04/2022
Elcomplus SmartPTT SCADA Server web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-28452

Publication date:
29/04/2022
Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2022

CVE-2022-24900

Publication date:
29/04/2022
Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2023

CVE-2021-41948

Publication date:
29/04/2022
A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-1536

Publication date:
29/04/2022
A vulnerability has been found in automad up to 1.10.9 and classified as problematic. This vulnerability affects the Dashboard. The manipulation of the argument title with the input Homealert("home") leads to a cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit details have disclosed to the public and may be used.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-44595

Publication date:
29/04/2022
Wondershare Dr. Fone Latest version as of 2021-12-06 is vulnerable to Incorrect Access Control. A normal user can send manually crafted packets to the ElevationService.exe and execute arbitrary code without any validation with SYSTEM privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023