Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2469

Publication date:
10/04/2025
An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 17.9.6, and 17.10 before 17.10.4. The runtime profiling data of a specific service was accessible to unauthenticated users.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2025-29017

Publication date:
10/04/2025
A Remote Code Execution (RCE) vulnerability exists in Code Astro Internet Banking System 2.0.0 due to improper file upload validation in the profile_pic parameter within pages_view_client.php.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2023-42007

Publication date:
10/04/2025
IBM Sterling Control Center 6.2.1, 6.3.1, and 6.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2025

CVE-2023-43035

Publication date:
10/04/2025
IBM Sterling Control Center 6.2.1, 6.3.1, and 6.4.0 allows web pages to be stored locally which can be read by another user on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2025

CVE-2023-43037

Publication date:
10/04/2025
IBM Maximo Application Suite 8.11 and 9.0 could allow an authenticated user to perform unauthorized actions due to improper input validation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2025-2408

Publication date:
10/04/2025
An issue has been discovered in GitLab CE/EE affecting all versions from 13.12 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions users could bypass IP access restrictions and view sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2025-30148

Publication date:
10/04/2025
Silverstripe Framework is a PHP framework which powers the Silverstripe CMS. Prior to 5.3.23, bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitized on the client-side, but server-side sanitization doesn't catch it. The server-side sanitization logic has been updated to sanitize against this attack. This vulnerability is fixed in 5.3.23.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-25197

Publication date:
10/04/2025
Silverstripe Elemental extends a page type to swap the content area for a list of manageable elements to compose a page out of rather than a single text field. An elemental block can include an XSS payload, which can be executed when viewing the "Content blocks in use" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. This vulnerability is fixed in 5.3.12.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-27812

Publication date:
10/04/2025
MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-27813

Publication date:
10/04/2025
MSI Center before 2.0.52.0 has Missing PE Signature Validation.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-1677

Publication date:
10/04/2025
A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2024-11129

Publication date:
10/04/2025
An issue has been discovered in GitLab EE affecting all versions from 17.1 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. This allows attackers to perform targeted searches with sensitive keywords to get the count of issues containing the searched term."
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025