Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21962

Publication date:
15/05/2026
Improper Input Validation in the AMD RAID driver could allow an attacker to point to an arbitrary memory location potentially resulting in privilege escalation and arbitrary code execution.
Severity CVSS v4.0: HIGH
Last modification:
15/05/2026

CVE-2024-36332

Publication date:
15/05/2026
Improper isolation of GPU HW register space could allow a privileged attacker in malicious Guest Virtual Machine (VM) to perform unauthorized access to specific victim range of GPU MMIO register space, potentially causing the host OS to reboot and creating a Denial of Service (DOS) condition.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026

CVE-2025-48521

Publication date:
15/05/2026
Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026

CVE-2025-52540

Publication date:
15/05/2026
An improper input validation vulnerability within the AMD Platform Management Framework (PMF) Driver can allow a local attacker to write Out-of-Bounds, potentially resulting in privilege escalation.
Severity CVSS v4.0: HIGH
Last modification:
15/05/2026

CVE-2026-0432

Publication date:
15/05/2026
Incorrect default permissions in the installation directory for the AMD chipset driver could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.
Severity CVSS v4.0: HIGH
Last modification:
15/05/2026

CVE-2026-0438

Publication date:
15/05/2026
A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026

CVE-2026-8612

Publication date:
15/05/2026
WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution.<br /> <br /> With no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend&amp;#39;s documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit.<br /> <br /> A local attacker with write access to the cache tree can replace a victim&amp;#39;s cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim&amp;#39;s next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2026

CVE-2025-0045

Publication date:
15/05/2026
Improper Input validation in the AMD Secure Processor (ASP) PCI driver may allow a local attacker to create a buffer overflow condition, potentially resulting in a crash or denial of service
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026

CVE-2025-48512

Publication date:
15/05/2026
Incorrect default permissions in the installation directory for the AMD general-purpose input/output controller (GPIO) could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.
Severity CVSS v4.0: HIGH
Last modification:
15/05/2026

CVE-2025-48519

Publication date:
15/05/2026
An improper input validation vulnerability within the AMD Platform Management Framework (PMF) driver can allow a local attacker to read or write Out-of-Bounds, potentially resulting in privilege escalation
Severity CVSS v4.0: HIGH
Last modification:
15/05/2026

CVE-2025-48520

Publication date:
15/05/2026
An improper input validation vulnerability within the AMD Platform Management Framework (PMF) driver can allow a local attacker to read Out-of-Bounds potentially resulting in information disclosure or a crash
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026

CVE-2024-36345

Publication date:
15/05/2026
Improper input validation in the AMD OverDrive (AOD) System Management Mode (SMM) module could allow a privileged attacker to perform an out-of-bounds read, potentially resulting in loss of confidentiality.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2026