Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21977

Publication date:
05/09/2025
Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-58280

Publication date:
05/09/2025
Vulnerability of exposing object heap addresses in the Ark eTS module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025

CVE-2025-58281

Publication date:
05/09/2025
Out-of-bounds read vulnerability in the runtime interpreter module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025

CVE-2025-58296

Publication date:
05/09/2025
Race condition vulnerability in the audio module.<br /> Impact: Successful exploitation of this vulnerability may affect function stability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025

CVE-2025-58313

Publication date:
05/09/2025
Race condition vulnerability in the device standby module.<br /> Impact: Successful exploitation of this vulnerability may cause feature exceptions of the device standby module.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025

CVE-2025-58276

Publication date:
05/09/2025
Permission verification vulnerability in the home screen module<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025

CVE-2025-48395

Publication date:
05/09/2025
An attacker with authenticated and privileged access could modify the contents of a non-sensitive file by traversing the path in the limited shell of the CLI. This security issue has been fixed in the latest version of NMC G2 which is available on the Eaton download center.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-8944

Publication date:
05/09/2025
The OceanWP WordPress theme before 4.1.2 is vulnerable to an option update due to a missing capability check on one of its AJAX request handler, allowing any authenticated users, such as subscriber to update the darkMod` setting.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2025-55037

Publication date:
05/09/2025
Improper neutralization of special elements used in an OS command (&amp;#39;OS Command Injection&amp;#39;) issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-55671

Publication date:
05/09/2025
Uncontrolled search path element issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, arbitrary code may be executed with the privilege of running the program.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-58400

Publication date:
05/09/2025
RATOC RAID Monitoring Manager for Windows provided by RATOC Systems, Inc. registers a Windows service with an unquoted file path. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-41408

Publication date:
05/09/2025
Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026