Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-0482

Publication date:
18/06/2001
Configuration error in Argus PitBull LX allows root users to bypass specified access control restrictions and cause a denial of service or execute arbitrary commands by modifying kernel variables such as MaxFiles, MaxInodes, and ModProbePath in /proc/sys via calls to sysctl.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0265

Publication date:
18/06/2001
ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1160

Publication date:
18/06/2001
udirectory.pl in Microburst Technologies uDirectory 2.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the category_file field.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0380

Publication date:
18/06/2001
Crosscom/Olicom XLT-F running XL 80 IM Version 5.5 Build Level 2 allows a remote attacker SNMP read and write access via a default, undocumented community string 'ILMI'.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0249

Publication date:
18/06/2001
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0401

Publication date:
18/06/2001
Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0403

Publication date:
18/06/2001
/opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1163

Publication date:
16/06/2001
Buffer overflow in Munica Corporation NetSQL 1.0 allows remote attackers to execute arbitrary code via a long CONNECT argument to port 6500.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1077

Publication date:
15/06/2001
Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1148

Publication date:
13/06/2001
Multiple buffer overflows in programs used by scoadmin and sysadmsh in SCO OpenServer 5.0.6a and earlier allow local users to gain privileges via a long TERM environment variable to (1) atcronsh, (2) auditsh, (3) authsh, (4) backupsh, (5) lpsh, (6) sysadm.menu, or (7) termsh.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1343

Publication date:
12/06/2001
ws_mail.cgi in WebStore 400/400CS 4.14 allows remote authenticated WebStore administrators to execute arbitrary code via shell metacharacters in the kill parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1344

Publication date:
12/06/2001
WSSecurity.pl in WebStore allows remote attackers to bypass authentication by providing the program with a filename that exists, which is made easier by (1) inserting a null character or (2) .. (dot dot).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025