Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-12867

Publication date:
20/12/2024
Server-Side Request Forgery in URL Mapper in Arctic Security's Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to exfiltrate and modify configurations and data.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2024-12842

Publication date:
20/12/2024
A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
05/06/2025

CVE-2024-55342

Publication date:
20/12/2024
A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2025

CVE-2024-12841

Publication date:
20/12/2024
A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/01/2025

CVE-2024-37758

Publication date:
20/12/2024
Improper access control in the endpoint /RoleMenuMapping/AddRoleMenu of Digiteam v4.21.0.0 allows authenticated attackers to escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-12677

Publication date:
20/12/2024
Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2024-56337

Publication date:
20/12/2024
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.<br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions <br /> may also be affected.<br /> <br /> <br /> The mitigation for CVE-2024-50379 was incomplete.<br /> <br /> Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation <br /> parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:<br /> - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)<br /> - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)<br /> - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)<br /> <br /> Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-55471

Publication date:
20/12/2024
Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-12840

Publication date:
20/12/2024
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. The problem described was inteded behavior and therefore not a bug.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2024-55186

Publication date:
20/12/2024
An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in the request URL. By changing the notification ID, an attacker can view sensitive mail details belonging to other users.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-55470

Publication date:
20/12/2024
Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-10385

Publication date:
20/12/2024
Ticket management system in DirectAdmin Evolution Skin is vulnerable to XSS (Cross-site Scripting), which allows a low-privileged user to inject and store malicious JavaScript code.<br /> If an admin views the ticket, the script might perform actions with their privileges, including command execution. <br /> This issue has been fixed in version 1.668 of DirectAdmin Evolution Skin.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026