Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-37091

Publication date:
24/06/2024
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in StylemixThemes Consulting Elementor Widgets, StylemixThemes Masterstudy Elementor Widgets allows OS Command Injection.This issue affects Consulting Elementor Widgets: from n/a through 1.3.0; Masterstudy Elementor Widgets: from n/a through 1.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2024

CVE-2024-36038

Publication date:
24/06/2024
Zoho ManageEngine ITOM products versions from 128234 to 128248 are affected by the stored cross-site scripting vulnerability in the proxy server option.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2024

CVE-2024-37089

Publication date:
24/06/2024
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in StylemixThemes Consulting Elementor Widgets allows PHP Local File Inclusion.This issue affects Consulting Elementor Widgets: from n/a through 1.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2024

CVE-2024-6160

Publication date:
24/06/2024
SQL Injection vulnerability in MegaBIP software allows attacker to disclose the contents of the database, obtain session cookies or modify the content of pages. This issue affects MegaBIP software versions through 5.12.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2024

CVE-2024-29868

Publication date:
24/06/2024
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.<br /> This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user&amp;#39;s account.<br /> This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.<br /> <br /> Users are recommended to upgrade to version 0.95.0, which fixes the issue.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2025

CVE-2024-4754

Publication date:
24/06/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Next4Biz CRM &amp; BPM Software Business Process Manangement (BPM) allows Stored XSS.This issue affects Business Process Manangement (BPM): from 6.6.4.4 before 6.6.4.5.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2024

CVE-2024-5683

Publication date:
24/06/2024
Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability in Next4Biz CRM &amp; BPM Software Business Process Manangement (BPM) allows Remote Code Inclusion.This issue affects Business Process Manangement (BPM): from 6.6.4.4 before 6.6.4.5.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2024

CVE-2024-36495

Publication date:
24/06/2024
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:<br /> <br /> <br /> <br /> C:\ProgramData\WINSelect\WINSelect.wsd<br /> <br /> The path for the affected WINSelect Enterprise configuration file is:<br /> <br /> C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2024

CVE-2024-36496

Publication date:
24/06/2024
The configuration file is encrypted with a static key derived from a <br /> static five-character password which allows an attacker to decrypt this <br /> file. The application hashes this five-character password with <br /> the outdated and broken MD5 algorithm (no salt) and uses the first five <br /> bytes as the key for RC4. The configuration file is then encrypted with <br /> these parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36497

Publication date:
24/06/2024
The decrypted configuration file contains the password in cleartext <br /> which is used to configure WINSelect. It can be used to remove the <br /> existing restrictions and disable WINSelect entirely.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-27136

Publication date:
24/06/2024
XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim&amp;#39;s browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025

CVE-2024-24554

Publication date:
24/06/2024
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Severity CVSS v4.0: MEDIUM
Last modification:
02/01/2026