Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-4206

Publication date:
29/04/2022
A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2021-4207

Publication date:
29/04/2022
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2021-3982

Publication date:
29/04/2022
Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2021-36207

Publication date:
29/04/2022
Under certain circumstances improper privilege management in Metasys ADS/ADX/OAS servers versions 10 and 11 could allow an authenticated user to elevate their privileges to administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-1114

Publication date:
29/04/2022
A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-1249

Publication date:
29/04/2022
A NULL pointer dereference flaw was found in pesign's cms_set_pw_data() function of the cms_common.c file. The function fails to handle the NULL pwdata invocation from daemon.c, which leads to an explicit NULL dereference and crash on all attempts to daemonize pesign.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-29856

Publication date:
29/04/2022
A hardcoded cryptographic key in Automation360 22 allows an attacker to decrypt exported RPA packages.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-1015

Publication date:
29/04/2022
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2023

CVE-2022-1195

Publication date:
29/04/2022
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-1353

Publication date:
29/04/2022
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2023

CVE-2022-1227

Publication date:
29/04/2022
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2024

CVE-2021-43938

Publication date:
29/04/2022
Elcomplus SmartPTT SCADA Server is vulnerable to an unauthenticated user can request various files from the server without any authentication or authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022