Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-6860

Publication date:
19/12/2023
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6861

Publication date:
19/12/2023
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6862

Publication date:
19/12/2023
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6863

Publication date:
19/12/2023
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6864

Publication date:
19/12/2023
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6865

Publication date:
19/12/2023
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6866

Publication date:
19/12/2023
TypedArrays can be fallible and lacked proper exception handling. This could lead to abuse in other APIs which expect TypedArrays to always succeed. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2023-6867

Publication date:
19/12/2023
The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-6868

Publication date:
19/12/2023
In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties.<br /> *This bug only affects Firefox on Android.* This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-50761

Publication date:
19/12/2023
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-50762

Publication date:
19/12/2023
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-6135

Publication date:
19/12/2023
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024