Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-33187

Publication date:
26/05/2023
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `type="password"` inputs. A customer may assume that switching to `type="text"` would also not record this input; hence, they would not add additional `highlight-mask` css-class obfuscation to this part of the DOM, resulting in unintentional recording of a password value when a `Show Password` button is used. This issue was patched in version 6.0.0.<br /> This patch tracks changes to the `type` attribute of an input to ensure an input that used to be a `type="password"` continues to be obfuscated. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2023

CVE-2023-33185

Publication date:
26/05/2023
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates. This issue was patched in version 3.5.0.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2023

CVE-2023-2879

Publication date:
26/05/2023
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-2857

Publication date:
26/05/2023
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2023-2858

Publication date:
26/05/2023
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-2854

Publication date:
26/05/2023
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2023-2855

Publication date:
26/05/2023
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-2856

Publication date:
26/05/2023
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-2825

Publication date:
26/05/2023
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2023-28321

Publication date:
26/05/2023
An improper certificate validation vulnerability exists in curl
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2023-28322

Publication date:
26/05/2023
An information disclosure vulnerability exists in curl
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2026

CVE-2023-28320

Publication date:
26/05/2023
A denial of service vulnerability exists in curl
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025