Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2003-0550

Publication date:
27/08/2003
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0551

Publication date:
27/08/2003
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0552

Publication date:
27/08/2003
Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0562

Publication date:
27/08/2003
Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0575

Publication date:
27/08/2003
Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0576

Publication date:
27/08/2003
Unknown vulnerability in the NFS daemon (nfsd) in SGI IRIX 6.5.19f and earlier allows remote attackers to cause a denial of service (kernel panic) via certain packets that cause XDR decoding errors, a different vulnerability than CVE-2003-0619.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1063

Publication date:
20/08/2003
The patches (1) 105693-13, (2) 108800-02, (3) 105694-13, and (4) 108801-02 for cachefs on Solaris 2.6 and 7 overwrite the inetd.conf file, which may silently reenable services and allow remote attackers to bypass the intended security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1202

Publication date:
19/08/2003
The checklogin function in omail.pl for omail webmail 0.98.4 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) password, (2) domainname, or (3) username.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0345

Publication date:
18/08/2003
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0350

Publication date:
18/08/2003
The control for listing accessibility options in the Accessibility Utility Manager on Windows 2000 (ListView) does not properly handle Windows messages, which allows local users to execute arbitrary code via a "Shatter" style message to the Utility Manager that references a user-controlled callback function.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0352

Publication date:
18/08/2003
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-0192

Publication date:
18/08/2003
Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle "certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one," which could cause Apache to use the weak ciphersuite.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025