Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-25752

Publication date:
02/06/2023
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2023

CVE-2023-0616

Publication date:
02/06/2023
If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-0430

Publication date:
02/06/2023
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-0547

Publication date:
02/06/2023
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-1945

Publication date:
02/06/2023
Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-0767

Publication date:
02/06/2023
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2023-23597

Publication date:
02/06/2023
A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the `file://` context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2023-23598

Publication date:
02/06/2023
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2023-23599

Publication date:
02/06/2023
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2023-23600

Publication date:
02/06/2023
Per origin notification permissions were being stored in a way that didn&amp;#39;t take into account what browsing context the permission was granted in. This lead to the possibility of notifications to be displayed during different browsing sessions.<br /> *This bug only affects Firefox for Android. Other operating systems are unaffected.* This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2023-23601

Publication date:
02/06/2023
Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2023-23602

Publication date:
02/06/2023
A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025