Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-24896

Publication date:
11/02/2025
Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, a login token named `token` is stored in a cookie for authentication purposes in Bull Dashboard, but this remains undeleted even after logout is performed. The primary affected users will be users who have logged into Misskey using a public PC or someone else's device, but it's possible that users who have logged out of Misskey before lending their PC to someone else could also be affected. Version 2025.2.0-alpha.0 contains a fix for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2025-24807

Publication date:
11/02/2025
eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0, per design, PermissionsCA is not full chain validated, nor is the expiration date validated. Access control plugin validates only the S/MIME signature which causes an expired PermissionsCA to be taken as valid. Even though this issue is responsible for allowing `governance/permissions` from an expired PermissionsCA and having the system crash when PermissionsCA is not self-signed and contains the full-chain, the impact is low. Versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0 contain a fix for the issue.
Severity CVSS v4.0: MEDIUM
Last modification:
21/02/2025

CVE-2025-22467

Publication date:
11/02/2025
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-47908

Publication date:
11/02/2025
OS command injection in the admin web console of Ivanti CSA before version 5.0.5 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13830

Publication date:
11/02/2025
Reflected XSS in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-13843

Publication date:
11/02/2025
Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13842

Publication date:
11/02/2025
A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13813

Publication date:
11/02/2025
Insufficient permissions in Ivanti Secure Access Client before version 22.8R1 allows a local authenticated attacker to delete arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-10644

Publication date:
11/02/2025
Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2024-11771

Publication date:
11/02/2025
Path traversal in Ivanti CSA before version 5.0.5 allows a remote unauthenticated attacker to access restricted functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2024-12058

Publication date:
11/02/2025
External control of a file name in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2024-12797

Publication date:
11/02/2025
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a<br /> server may fail to notice that the server was not authenticated, because<br /> handshakes don&amp;#39;t abort as expected when the SSL_VERIFY_PEER verification mode<br /> is set.<br /> <br /> Impact summary: TLS and DTLS connections using raw public keys may be<br /> vulnerable to man-in-middle attacks when server authentication failure is not<br /> detected by clients.<br /> <br /> RPKs are disabled by default in both TLS clients and TLS servers. The issue<br /> only arises when TLS clients explicitly enable RPK use by the server, and the<br /> server, likewise, enables sending of an RPK instead of an X.509 certificate<br /> chain. The affected clients are those that then rely on the handshake to<br /> fail when the server&amp;#39;s RPK fails to match one of the expected public keys,<br /> by setting the verification mode to SSL_VERIFY_PEER.<br /> <br /> Clients that enable server-side raw public keys can still find out that raw<br /> public key verification failed by calling SSL_get_verify_result(), and those<br /> that do, and take appropriate action, are not affected. This issue was<br /> introduced in the initial implementation of RPK support in OpenSSL 3.2.<br /> <br /> The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2025