Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-38207

Publication date:
23/08/2024
Microsoft Edge (HTML-based) Memory Corruption Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-37392

Publication date:
23/08/2024
A stored Cross-Site Scripting (XSS) vulnerability has been identified in SMSEagle software version
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025

CVE-2024-40111

Publication date:
23/08/2024
A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker to inject malicious JavaScript code into the template body. The injected code is stored within the flat file CMS and is executed in the browser of any user visiting the forum.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2024-45189

Publication date:
23/08/2024
Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Git Content" request
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2024

CVE-2024-45190

Publication date:
23/08/2024
Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2025

CVE-2024-45188

Publication date:
23/08/2024
Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "File Content" request
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2025

CVE-2024-42914

Publication date:
23/08/2024
A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2024-45187

Publication date:
23/08/2024
Guest users in the Mage AI framework that remain logged in after their accounts are deleted, are mistakenly given high privileges and specifically given access to remotely execute arbitrary code through the Mage AI terminal server
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2025

CVE-2024-42845

Publication date:
23/08/2024
An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2026

CVE-2024-7954

Publication date:
23/08/2024
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-42852

Publication date:
23/08/2024
Cross Site Scripting vulnerability in AcuToWeb server v.10.5.0.7577C8b allows a remote attacker to execute arbitrary code via the index.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2024

CVE-2024-42992

Publication date:
23/08/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024