Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-0101

Publication date:
12/02/2001
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0103

Publication date:
12/02/2001
CoffeeCup Direct and Free FTP clients uses weak encryption to store passwords in the FTPServers.ini file, which could allow attackers to easily decrypt the passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0104

Publication date:
12/02/2001
MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0061

Publication date:
12/02/2001
procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0062

Publication date:
12/02/2001
procfs in FreeBSD and possibly other operating systems allows local users to cause a denial of service by calling mmap on the process' own mem file, which causes the kernel to hang.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0063

Publication date:
12/02/2001
procfs in FreeBSD and possibly other operating systems allows local users to bypass access control restrictions for a jail environment and gain additional privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0069

Publication date:
12/02/2001
dialog before 0.9a-20000118-3bis in Debian GNU/Linux allows local users to overwrite arbitrary files via a symlink attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0071

Publication date:
12/02/2001
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0072

Publication date:
12/02/2001
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0077

Publication date:
12/02/2001
The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0078

Publication date:
12/02/2001
in.mond in Sun Cluster 2.x allows local users to read arbitrary files via a symlink attack on the status file of a host running HA-NFS.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0080

Publication date:
12/02/2001
Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of service by connecting to the SSH service with a non-SSH client, which generates a protocol mismatch error.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025