Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-27529

Publication date:
18/04/2022
A maliciously crafted PICT, BMP, PSD or TIF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 may be used to write beyond the allocated buffer while parsing PICT, BMP, PSD or TIF file. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2022-27530

Publication date:
18/04/2022
A maliciously crafted TIF or PICT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to write beyond the allocated buffer through Buffer overflow vulnerability. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2022

CVE-2022-27525

Publication date:
18/04/2022
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2022

CVE-2022-25226

Publication date:
18/04/2022
ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-42778

Publication date:
18/04/2022
A heap double free issue was found in Opensc before version 0.22.0 in sc_pkcs15_free_tokeninfo.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-42779

Publication date:
18/04/2022
A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-42780

Publication date:
18/04/2022
A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-42781

Publication date:
18/04/2022
Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-42782

Publication date:
18/04/2022
Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2021-3681

Publication date:
18/04/2022
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3624

Publication date:
18/04/2022
There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3503

Publication date:
18/04/2022
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. The highest threat from this vulnerability is to the confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022