Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-24030

Publication date:
23/01/2025
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-42187

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by path traversal vulnerability. The application could allow operators to download files from a local repository which is vulnerable to path traversal attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2023-32340

Publication date:
23/01/2025
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2025

CVE-2023-50309

Publication date:
23/01/2025
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2025

CVE-2024-42184

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by insecure support for file URI scheme. It could allow a malicious operator to attempt to download files using the file:// URI scheme.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-42185

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by an insecure package which is susceptible to XML injection attacks. This allows an attacker to exploit this vulnerability by injecting malicious XML content, which can lead to various issues including denial of service and unauthorized access.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-42186

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by an insecure protocol support. The application can allow improper handling of SSL certificates validation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-42183

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability. It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-57722

Publication date:
23/01/2025
lunasvg v3.0.0 was discovered to contain a allocation-size-too-big bug via the component plutovg_surface_create.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2024-57723

Publication date:
23/01/2025
lunasvg v3.0.0 was discovered to contain a segmentation violation via the component composition_source_over.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2024-57724

Publication date:
23/01/2025
lunasvg v3.0.0 was discovered to contain a segmentation violation via the component gray_record_cell.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2024-42182

Publication date:
23/01/2025
BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability. It may allow the application to download files from an internally hosted server on localhost.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025