Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-12058

Publication date:
11/02/2025
External control of a file name in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2024-12797

Publication date:
11/02/2025
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a<br /> server may fail to notice that the server was not authenticated, because<br /> handshakes don&amp;#39;t abort as expected when the SSL_VERIFY_PEER verification mode<br /> is set.<br /> <br /> Impact summary: TLS and DTLS connections using raw public keys may be<br /> vulnerable to man-in-middle attacks when server authentication failure is not<br /> detected by clients.<br /> <br /> RPKs are disabled by default in both TLS clients and TLS servers. The issue<br /> only arises when TLS clients explicitly enable RPK use by the server, and the<br /> server, likewise, enables sending of an RPK instead of an X.509 certificate<br /> chain. The affected clients are those that then rely on the handshake to<br /> fail when the server&amp;#39;s RPK fails to match one of the expected public keys,<br /> by setting the verification mode to SSL_VERIFY_PEER.<br /> <br /> Clients that enable server-side raw public keys can still find out that raw<br /> public key verification failed by calling SSL_get_verify_result(), and those<br /> that do, and take appropriate action, are not affected. This issue was<br /> introduced in the initial implementation of RPK support in OpenSSL 3.2.<br /> <br /> The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-33659

Publication date:
11/02/2025
AMI APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Input Validation by a local attacker. Successful exploitation of these vulnerabilities may lead to overwriting arbitrary memory and execute arbitrary code at SMM level, also impacting Confidentiality, Integrity, and Availability.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-26492

Publication date:
11/02/2025
In JetBrains TeamCity before 2024.12.2 improper Kubernetes connection settings could expose sensitive resources
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-26493

Publication date:
11/02/2025
In JetBrains TeamCity before 2024.12.2 several DOM-based XSS were possible on the Code Inspection Report tab
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-1231

Publication date:
11/02/2025
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2024-12366

Publication date:
11/02/2025
PandasAI uses an interactive prompt function that is vulnerable to prompt injection and run arbitrary Python code that can lead to Remote Code Execution (RCE) instead of the intended explanation of the natural language processing by the LLM.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-0588

Publication date:
11/02/2025
In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated.
Severity CVSS v4.0: MEDIUM
Last modification:
02/07/2025

CVE-2025-24956

Publication date:
11/02/2025
A vulnerability has been identified in OpenV2G (All versions
Severity CVSS v4.0: MEDIUM
Last modification:
24/09/2025

CVE-2025-26490

Publication date:
11/02/2025
Rejected reason: This CVE ID is a duplicate of CVE-2025-26495.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2025-26491

Publication date:
11/02/2025
Rejected reason: This CVE ID is a duplicate of CVE-2025-26494.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2025-24812

Publication date:
11/02/2025
A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0) (All versions
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026