Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-25845

Publication date:
08/03/2024
In the module "CD Custom Fields 4 Orders" (cdcustomfields4orders)
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2024-25848

Publication date:
08/03/2024
In the module "Ever Ultimate SEO" (everpsseo)
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2024-25849

Publication date:
08/03/2024
In the module "Make an offer" (makeanoffer)
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2024-26313

Publication date:
08/03/2024
Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.13.P3 HF1 (6.13.0.3.1) is also a fixed release.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-2277

Publication date:
08/03/2024
A vulnerability was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /Setting/change_password_save of the component Password Reset Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256046 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2024-26309

Publication date:
08/03/2024
Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a sensitive information disclosure vulnerability. An unauthenticated attacker could potentially obtain access to sensitive information via an internal URL.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2025

CVE-2024-23287

Publication date:
08/03/2024
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. An app may be able to access user-sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2024-23288

Publication date:
08/03/2024
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, watchOS 10.4. An app may be able to elevate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2024-23289

Publication date:
08/03/2024
A lock screen issue was addressed with improved state management. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. A person with physical access to a device may be able to use Siri to access private calendar information.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2024-23290

Publication date:
08/03/2024
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, watchOS 10.4. An app may be able to access user-sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2024-23291

Publication date:
08/03/2024
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, watchOS 10.4. A malicious app may be able to observe user data in log entries related to accessibility notifications.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2024-23292

Publication date:
08/03/2024
This issue was addressed with improved data protection. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. An app may be able to access information about a user's contacts.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026