Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-0631

Publication date:
01/03/2005
delpm.php in PBLang 4.63 allows remote authenticated users to delete arbitrary PM files by modifying the "id" and "a" parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0986

Publication date:
01/03/2005
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0992

Publication date:
01/03/2005
Format string vulnerability in the -a option (daemon mode) in Proxytunnel before 1.2.3 allows remote attackers to execute arbitrary code via format string specifiers in an invalid proxy answer.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1003

Publication date:
01/03/2005
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1006

Publication date:
01/03/2005
Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code via certain DNS messages, a different vulnerability than CVE-2002-0702.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1007

Publication date:
01/03/2005
The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1021

Publication date:
01/03/2005
iCal before 1.5.4 on Mac OS X 10.2.3, and other later versions, does not alert the user when handling calendars that use alarms, which allows attackers to execute programs and send e-mail via alarms.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1027

Publication date:
01/03/2005
Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1030

Publication date:
01/03/2005
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to gain sensitive information by calling fcronsighup with an arbitrary file, which reveals the contents of the file that can not be parsed in an error message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1031

Publication date:
01/03/2005
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1032

Publication date:
01/03/2005
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters such that fcronsighup does not properly append the intended fcrontab.sig to the resulting string.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-1033

Publication date:
01/03/2005
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025