Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-24896

Publication date:
11/02/2025
Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, a login token named `token` is stored in a cookie for authentication purposes in Bull Dashboard, but this remains undeleted even after logout is performed. The primary affected users will be users who have logged into Misskey using a public PC or someone else's device, but it's possible that users who have logged out of Misskey before lending their PC to someone else could also be affected. Version 2025.2.0-alpha.0 contains a fix for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2025-24900

Publication date:
11/02/2025
Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.<br /> The affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2025-24897

Publication date:
11/02/2025
Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, due to a lack of CSRF protection and the lack of proper security attributes in the authentication cookies of Bull&amp;#39;s dashboard, some of the APIs of bull-board may be subject to CSRF attacks. There is a risk of this vulnerability being used for attacks with relatively large impact on availability and integrity, such as the ability to add arbitrary jobs. This vulnerability was fixed in 2025.2.0-alpha.0. As a workaround, block all access to the `/queue` directory with a web application firewall (WAF).
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-22467

Publication date:
11/02/2025
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-47908

Publication date:
11/02/2025
OS command injection in the admin web console of Ivanti CSA before version 5.0.5 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13813

Publication date:
11/02/2025
Insufficient permissions in Ivanti Secure Access Client before version 22.8R1 allows a local authenticated attacker to delete arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13830

Publication date:
11/02/2025
Reflected XSS in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-13842

Publication date:
11/02/2025
A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-13843

Publication date:
11/02/2025
Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-12797

Publication date:
11/02/2025
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a<br /> server may fail to notice that the server was not authenticated, because<br /> handshakes don&amp;#39;t abort as expected when the SSL_VERIFY_PEER verification mode<br /> is set.<br /> <br /> Impact summary: TLS and DTLS connections using raw public keys may be<br /> vulnerable to man-in-middle attacks when server authentication failure is not<br /> detected by clients.<br /> <br /> RPKs are disabled by default in both TLS clients and TLS servers. The issue<br /> only arises when TLS clients explicitly enable RPK use by the server, and the<br /> server, likewise, enables sending of an RPK instead of an X.509 certificate<br /> chain. The affected clients are those that then rely on the handshake to<br /> fail when the server&amp;#39;s RPK fails to match one of the expected public keys,<br /> by setting the verification mode to SSL_VERIFY_PEER.<br /> <br /> Clients that enable server-side raw public keys can still find out that raw<br /> public key verification failed by calling SSL_get_verify_result(), and those<br /> that do, and take appropriate action, are not affected. This issue was<br /> introduced in the initial implementation of RPK support in OpenSSL 3.2.<br /> <br /> The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2025

CVE-2024-10644

Publication date:
11/02/2025
Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2024-11771

Publication date:
11/02/2025
Path traversal in Ivanti CSA before version 5.0.5 allows a remote unauthenticated attacker to access restricted functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025