Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-0112

Publication date:
20/02/2025
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity.
Severity CVSS v4.0: MEDIUM
Last modification:
20/02/2025

CVE-2024-12284

Publication date:
20/02/2025
Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2024-37361

Publication date:
20/02/2025
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)<br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.<br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-37362

Publication date:
20/02/2025
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522) <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when saving connections to RedShift.<br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Products must not disclose sensitive information without cause. Disclosure of sensitive information can lead to further exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-37363

Publication date:
20/02/2025
The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)<br /> <br /> <br /> <br /> <br /> <br /> <br />  Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctly perform an authorization check in the data source management service.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> When access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-6696

Publication date:
20/02/2025
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. (CWE-1220) <br /> <br /> <br /> <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not correctly perform an authorization check in the user console trash content<br /> <br /> <br /> <br /> <br /> <br /> <br />  An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2025-24989

Publication date:
19/02/2025
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.<br /> This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you&amp;#39;ve not been notified this vulnerability does not affect you.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-25942

Publication date:
19/02/2025
An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2025-25943

Publication date:
19/02/2025
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2025-25944

Publication date:
19/02/2025
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2025-25945

Publication date:
19/02/2025
An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2025-25946

Publication date:
19/02/2025
An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025