Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-6931

Publication date:
19/12/2023
A heap out-of-bounds write vulnerability in the Linux kernel&amp;#39;s Performance Events system component can be exploited to achieve local privilege escalation.<br /> <br /> A perf_event&amp;#39;s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().<br /> <br /> We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-6932

Publication date:
19/12/2023
A use-after-free vulnerability in the Linux kernel&amp;#39;s ipv4: igmp component can be exploited to achieve local privilege escalation.<br /> <br /> A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.<br /> <br /> We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2025

CVE-2023-6856

Publication date:
19/12/2023
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6857

Publication date:
19/12/2023
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. <br /> *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6858

Publication date:
19/12/2023
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2023-6859

Publication date:
19/12/2023
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6860

Publication date:
19/12/2023
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6861

Publication date:
19/12/2023
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6862

Publication date:
19/12/2023
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6863

Publication date:
19/12/2023
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6864

Publication date:
19/12/2023
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6865

Publication date:
19/12/2023
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024