Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2010-10012

Publication date:
23/07/2025
A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2015-10141

Publication date:
23/07/2025
An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.
Severity CVSS v4.0: CRITICAL
Last modification:
25/07/2025

CVE-2016-15045

Publication date:
23/07/2025
A local privilege escalation vulnerability exists in lastore-daemon, the system package manager daemon used in Deepin Linux (developed by Wuhan Deepin Technology Co., Ltd.). In versions 0.9.53-1 (Deepin 15.5) and 0.9.66-1 (Deepin 15.7), the D-Bus configuration permits any user in the sudo group to invoke the InstallPackage method without password authentication. By default, the first user created on Deepin is in the sudo group. An attacker with shell access can craft a .deb package containing a malicious post-install script and use dbus-send to install it via lastore-daemon, resulting in arbitrary code execution as root.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2025-4411

Publication date:
23/07/2025
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dataprom Informatics PACS-ACSS allows Cross-Site Scripting (XSS).This issue affects PACS-ACSS: before 16.05.2025.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2025

CVE-2025-50127

Publication date:
23/07/2025
A SQLi vulnerability in DJ-Flyer component 1.0-3.2 for Joomla was discovered. The issue allows privileged users to execute arbitrary SQL commands.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2025-54294

Publication date:
23/07/2025
A SQLi vulnerability in Komento component 4.0.0-4.0.7for Joomla was discovered. The issue allows unprivileged users to execute arbitrary SQL commands.
Severity CVSS v4.0: CRITICAL
Last modification:
25/07/2025

CVE-2025-54295

Publication date:
23/07/2025
A Reflected XSS vulnerability in DJ-Reviews component 1.0-1.3.6 for Joomla was discovered.
Severity CVSS v4.0: MEDIUM
Last modification:
25/07/2025

CVE-2025-54296

Publication date:
23/07/2025
A stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla was discovered.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2025-54297

Publication date:
23/07/2025
A stored XSS vulnerability in CComment component 5.0.0-6.1.14 for Joomla was discovered.
Severity CVSS v4.0: HIGH
Last modification:
25/07/2025

CVE-2024-41751

Publication date:
23/07/2025
IBM SmartCloud Analytics - Log Analysis 1.3.7.0, 1.3.7.1, 1.3.7.2, 1.3.8.0, 1.3.8.1, and 1.3.8.2 could allow a local, authenticated attacker to bypass client-side enforcement of security to manipulate data.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-4296

Publication date:
23/07/2025
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HotelRunner B2B allows Forceful Browsing.This issue affects B2B: before 04.06.2025.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2025

CVE-2024-40682

Publication date:
23/07/2025
IBM SmartCloud Analytics - Log Analysis 1.3.7.0, 1.3.7.1, 1.3.7.2, 1.3.8.0, 1.3.8.1, and 1.3.8.2 could allow a local user to cause a denial of service due to improper validation of specified type of input.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025