Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-20009

Publication date:
05/02/2024
In alac decoder, there is a possible out of bounds write due to an incorrect error handling. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441150; Issue ID: ALPS08441150.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-20010

Publication date:
05/02/2024
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-20011

Publication date:
05/02/2024
In alac decoder, there is a possible information disclosure due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441146; Issue ID: ALPS08441146.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-20012

Publication date:
05/02/2024
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025

CVE-2024-20013

Publication date:
05/02/2024
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-20015

Publication date:
05/02/2024
In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-20016

Publication date:
05/02/2024
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation Patch ID: ALPS07835901; Issue ID: ALPS07835901.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-24866

Publication date:
05/02/2024
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Reflected XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-24870

Publication date:
05/02/2024
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Dempfle Advanced iFrame allows Stored XSS.This issue affects Advanced iFrame: from n/a through 2023.10.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2023-5677

Publication date:
05/02/2024
Brandon<br /> Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi<br /> did not have a sufficient input validation allowing for a possible remote code<br /> execution. This flaw can only be exploited after authenticating with an<br /> operator- or administrator-privileged service account. The impact of exploiting<br /> this vulnerability is lower with operator-privileges compared to<br /> administrator-privileges service accounts. Please refer to the Axis security advisory<br /> for more information and solution.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2023-5800

Publication date:
05/02/2024
Vintage,<br /> member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi<br /> did not have a sufficient input validation allowing for a possible remote code<br /> execution. This flaw can only be exploited after authenticating with an<br /> operator- or administrator-privileged service account. Axis has released patched AXIS OS<br /> versions for the highlighted flaw. Please refer to the Axis security advisory<br /> for more information and solution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2024

CVE-2023-51504

Publication date:
05/02/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Dan Dulaney Dan&amp;#39;s Embedder for Google Calendar allows Stored XSS.This issue affects Dan&amp;#39;s Embedder for Google Calendar: from n/a through 1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026