Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-53763

Publication date:
21/08/2025
Improper access control in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-51989

Publication date:
21/08/2025
HTML injection vulnerability in the registration interface in Evolution Consulting Kft. HRmaster module v235 allows an attacker to inject HTML tags into the "keresztnév" (firstname) field, which will be sent out in an email resulting in possible Phishing scenarios against any, previously not registered, email address.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-41415

Publication date:
21/08/2025
The vulnerability, if exploited, could allow an authenticated miscreant <br /> (with privileges to access publication targets) to retrieve sensitive <br /> information that could then be used to gain additional access to <br /> downstream resources.
Severity CVSS v4.0: HIGH
Last modification:
22/08/2025

CVE-2025-27714

Publication date:
21/08/2025
An attacker could exploit this vulnerability by uploading arbitrary <br /> files via the a specific endpoint, leading to unauthorized remote code <br /> execution or system compromise.
Severity CVSS v4.0: MEDIUM
Last modification:
22/08/2025

CVE-2025-27721

Publication date:
21/08/2025
Unauthorized users can access INFINITT PACS System Manager without proper authorization, <br /> which could lead to unauthorized access to system resources.
Severity CVSS v4.0: HIGH
Last modification:
22/08/2025

CVE-2025-3128

Publication date:
21/08/2025
A remote unauthenticated attacker who has bypassed authentication could <br /> execute arbitrary OS commands to disclose, tamper with, destroy or <br /> delete information in Mitsubishi Electric smartRTU, or cause a denial-of<br /> service condition on the product.
Severity CVSS v4.0: CRITICAL
Last modification:
22/08/2025

CVE-2010-20111

Publication date:
21/08/2025
Digital Music Pad v8.2.3.3.4 contains a stack-based buffer overflow vulnerability in its playlist file parser. When opening a .pls file containing an excessively long string in the File1 field, the application fails to properly validate input length, resulting in corruption of the Structured Exception Handler (SEH) on the stack. This flaw may allow an attacker to control execution flow when the file is opened, potentially leading to arbitrary code execution.
Severity CVSS v4.0: HIGH
Last modification:
22/08/2025

CVE-2010-20112

Publication date:
21/08/2025
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
Severity CVSS v4.0: CRITICAL
Last modification:
22/08/2025

CVE-2010-20119

Publication date:
21/08/2025
CommuniCrypt Mail versions up to and including 1.16 contains a stack-based buffer overflow vulnerability in its ANSMTP.dll and AOSMTP.dll ActiveX controls, specifically within the AddAttachments() method. This method fails to properly validate the length of input strings, allowing data to exceed the bounds of a fixed-size stack buffer. When invoked with an overly long string, the control can corrupt adjacent memory structures, including exception handlers, leading to potential control flow disruption.
Severity CVSS v4.0: HIGH
Last modification:
22/08/2025

CVE-2010-20121

Publication date:
21/08/2025
EasyFTP Server versions up to 1.7.0.11 contain a stack-based buffer overflow vulnerability in the FTP command parser. When processing the CWD (Change Working Directory) command, the server fails to properly validate the length of the input string, allowing attackers to overwrite memory on the stack. This flaw enables remote code execution without authentication, as EasyFTP allows anonymous access by default. The vulnerability was resolved in version 1.7.0.12, after which the product was renamed “UplusFtp.”
Severity CVSS v4.0: CRITICAL
Last modification:
10/09/2025

CVE-2025-24489

Publication date:
21/08/2025
An attacker could exploit this vulnerability by uploading arbitrary <br /> files via a specific service, which could lead to system compromise.
Severity CVSS v4.0: MEDIUM
Last modification:
22/08/2025

CVE-2010-10015

Publication date:
21/08/2025
AOL versions up to and including 9.5 includes an ActiveX control (Phobos.dll) that exposes a method called Import() via the Phobos.Playlist COM object. This method is vulnerable to a stack-based buffer overflow when provided with an excessively long string argument. Exploitation allows remote attackers to execute arbitrary code in the context of the user, but only when the malicious HTML file is opened locally, due to the control not being marked safe for scripting or initialization. AOL remains an active and supported brand offering services like AOL Mail and AOL Desktop Gold, but the legacy AOL 9.5 desktop software—specifically the version containing the vulnerable Phobos.dll ActiveX control—is long discontinued and no longer maintained.
Severity CVSS v4.0: HIGH
Last modification:
22/08/2025