Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-0010

Publication date:
06/09/2025
An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2024-36352

Publication date:
06/09/2025
Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary writes or denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2024-36354

Publication date:
06/09/2025
Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-21947

Publication date:
06/09/2025
Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting in arbitrary code execution at the SMM level.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-21970

Publication date:
06/09/2025
Improper validation of an array index in the AND power Management Firmware could allow a privileged attacker to corrupt AGESA memory potentially leading to a loss of integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2024-36326

Publication date:
06/09/2025
Missing authorization in AMD RomArmor could allow an attacker to bypass ROMArmor protections during system resume from a standby state, potentially resulting in a loss of confidentiality and integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2024-36342

Publication date:
06/09/2025
Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-36346

Publication date:
06/09/2025
Improper input validation in AMD Power Management Firmware (PMFW) could allow a privileged attacker from Guest VM to send arbitrary input data potentially causing a GPU Reset condition.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2024-36331

Publication date:
06/09/2025
Improper initialization of CPU cache memory could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-31365

Publication date:
06/09/2025
An integer overflow in the SMU could allow a privileged attacker to potentially write memory beyond the end of the reserved dRAM area resulting in loss of integrity or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2023-31306

Publication date:
06/09/2025
Improper validation of an array index in the AMD graphics driver software could allow an attacker to pass malformed arguments to the dynamic power management (DPM) functions resulting in an out of bounds read and loss of availability.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2023-31322

Publication date:
06/09/2025
Type confusion in the ASP could allow an attacker to pass a malformed argument to the Reliability, Availability, and Serviceability trusted application (RAS TA) potentially leading to a read or write to shared memory resulting in loss of confidentiality, integrity, or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025