Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64427

Publication date:
02/03/2026
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-70252

Publication date:
02/03/2026
An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_multi. The index and mode are controllable. If the conditions are met to sprintf, they will be spliced into tmp. It is worth noting that there is no size check,which leads to a stack overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47385

Publication date:
02/03/2026
Memory Corruption when accessing trusted execution environment without proper privilege check.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47386

Publication date:
02/03/2026
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47381

Publication date:
02/03/2026
Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47383

Publication date:
02/03/2026
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47384

Publication date:
02/03/2026
Transient DOS when MAC configures config id greater than supported maximum value.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47377

Publication date:
02/03/2026
Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47378

Publication date:
02/03/2026
Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47379

Publication date:
02/03/2026
Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47375

Publication date:
02/03/2026
Memory corruption while handling different IOCTL calls from the user-space simultaneously.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2025-47376

Publication date:
02/03/2026
Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026