Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-44964

Publication date:
05/08/2025
A lack of SSL certificate validation in BlueStacks v5.20 allows attackers to execute a man-it-the-middle attack and obtain sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2025

CVE-2025-50706

Publication date:
05/08/2025
An issue in thinkphp v.5.1 allows a remote attacker to execute arbitrary code via the routecheck function
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2025

CVE-2025-2611

Publication date:
05/08/2025
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling.<br /> <br /> <br /> <br /> <br /> Versions 7.4 and below are known to be vulnerable.
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025

CVE-2025-47152

Publication date:
05/08/2025
An out-of-bounds read vulnerability exists in the EMF functionality of PDF-XChange Co. Ltd PDF-XChange Editor 10.6.0.396. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-29745

Publication date:
05/08/2025
A vulnerability affecting the scanning module in Emsisoft Anti-Malware prior to 2024.12 allows attackers on a remote server to obtain Net-NTLMv2 hash information via a specially created A2S (Emsisoft Custom Scan) extension file.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2025-27931

Publication date:
05/08/2025
An out-of-bounds read vulnerability exists in the EMF functionality of PDF-XChange Editor version 10.5.2.395. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-7025

Publication date:
05/08/2025
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.
Severity CVSS v4.0: HIGH
Last modification:
07/08/2025

CVE-2025-7032

Publication date:
05/08/2025
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.
Severity CVSS v4.0: HIGH
Last modification:
07/08/2025

CVE-2025-7033

Publication date:
05/08/2025
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.
Severity CVSS v4.0: HIGH
Last modification:
07/08/2025

CVE-2024-52890

Publication date:
05/08/2025
IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.03 could be susceptible to cross-site scripting due to no validation of URIs.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2025

CVE-2025-54987

Publication date:
05/08/2025
A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is essentially the same as CVE-2025-54948 but targets a different CPU architecture.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2025

CVE-2025-54948

Publication date:
05/08/2025
A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025