Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-42007

Publication date:
26/07/2024
SPX (aka php-spx) through 0.4.15 allows SPX_UI_URI Directory Traversal to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-38871

Publication date:
26/07/2024
Zohocorp ManageEngine Exchange Reporter Plus versions 5717 and below are vulnerable to the authenticated SQL injection in the reports module.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2024-38872

Publication date:
26/07/2024
Zohocorp ManageEngine Exchange Reporter Plus versions 5717 and below are vulnerable to the authenticated SQL injection in the monitoring module.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2024-39304

Publication date:
26/07/2024
ChurchCRM is an open-source church management system. Versions of the application prior to 5.9.2 are vulnerable to an authenticated SQL injection due to an improper sanitization of user input. Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to `/GetText.php`. Version 5.9.2 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-41353

Publication date:
26/07/2024
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\groups\edit-group.php
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2024-41354

Publication date:
26/07/2024
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/widgets/edit.php
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2024-41373

Publication date:
26/07/2024
ICEcoder 8.1 contains a Path Traversal vulnerability via lib/backup-versions-preview-loader.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2024-41374

Publication date:
26/07/2024
ICEcoder 8.1 is vulnerable to Cross Site Scripting (XSS) via lib/settings-screen.php
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2024-41375

Publication date:
26/07/2024
ICEcoder 8.1 is vulnerable to Cross Site Scripting (XSS) via lib/terminal-xhr.php
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2024-41812

Publication date:
26/07/2024
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-41813

Publication date:
26/07/2024
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Starting in version 1.4.0 and prior to version 1.6.1, a Server-Side Request Forgery (SSRF) vulnerability in the `/proxy` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.6.1 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-24257

Publication date:
26/07/2024
An issue in skteco.com Central Control Attendance Machine web management platform v.3.0 allows an attacker to obtain sensitive information via a crafted script to the csl/user component.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026