Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-0338

Publication date:
27/06/2001
Internet Explorer 5.5 and earlier does not properly validate digital certificates when Certificate Revocation List (CRL) checking is enabled, which could allow remote attackers to spoof trusted web sites, aka the "Server certificate validation vulnerability."
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0339

Publication date:
27/06/2001
Internet Explorer 5.5 and earlier allows remote attackers to display a URL in the address bar that is different than the URL that is actually being displayed, which could be used in web site spoofing attacks, aka the "Web page spoofing vulnerability."
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0407

Publication date:
27/06/2001
Directory traversal vulnerability in MySQL before 3.23.36 allows local users to modify arbitrary files and gain privileges by creating a database whose name starts with .. (dot dot).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0417

Publication date:
27/06/2001
Kerberos 4 (aka krb4) allows local users to overwrite arbitrary files via a symlink attack on new ticket files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1083

Publication date:
26/06/2001
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1324

Publication date:
26/06/2001
cvmlogin and statfile in Paul Jarc idtools before 2001.06.27 do not properly check the return value of a call to the pathexec_env function, which could cause the setstate utility to setuid to the UID environment variable and allow local users to gain privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1162

Publication date:
23/06/2001
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0906

Publication date:
22/06/2001
teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1328

Publication date:
22/06/2001
Buffer overflow in ypbind daemon in Solaris 5.4 through 8 allows remote attackers to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1078

Publication date:
21/06/2001
Format string vulnerability in flog function of eXtremail 1.1.9 and earlier allows remote attackers to gain root privileges via format specifiers in the SMTP commands (1) HELO, (2) EHLO, (3) MAIL FROM, or (4) RCPT TO, and the POP3 commands (5) USER and (6) other commands that can be executed after POP3 authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1276

Publication date:
21/06/2001
ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1459

Publication date:
19/06/2001
OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025