Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-29094

Publication date:
04/06/2025
Cross Site Scripting vulnerability in Motivian Content Mangment System v.41.0.0 allows a remote attacker to execute arbitrary code via the Marketing/Forms, Marketing/Offers and Content/Pages components.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2025-23106

Publication date:
04/06/2025
An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2025-23095

Publication date:
04/06/2025
An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2025-23096

Publication date:
04/06/2025
An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2025-23101

Publication date:
04/06/2025
An issue was discovered in Samsung Mobile Processor Exynos 1380. A Use-After-Free in the mobile processor leads to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2025-5592

Publication date:
04/06/2025
A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/06/2025

CVE-2025-48960

Publication date:
04/06/2025
Weak server key used for TLS encryption. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48961

Publication date:
04/06/2025
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39938.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48962

Publication date:
04/06/2025
Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-27811

Publication date:
04/06/2025
A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025

CVE-2025-1701

Publication date:
04/06/2025
CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM&amp;#39;s implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.<br /> <br /> Users of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.<br /> <br /> <br /> <br /> This issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-5597

Publication date:
04/06/2025
Improper Authentication vulnerability in WF Steuerungstechnik GmbH airleader MASTER allows Authentication Bypass.This issue affects airleader MASTER: 3.00571.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026