Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2002-1126

Publication date:
24/09/2002
Mozilla 1.1 and earlier, and Mozilla-based browsers such as Netscape and Galeon, set the document referrer too quickly in certain situations when a new page is being loaded, which allows web pages to determine the next page that is being visited, including manually entered URLs, using the onunload handler.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-1124

Publication date:
24/09/2002
Multiple buffer overflows in purity 1-16 allow local users to gain privileges and modify high scores tables.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0983

Publication date:
24/09/2002
IRC client irssi in irssi-text before 0.8.4 allows remote attackers to cause a denial of service (crash) via an IRC channel that has a long topic followed by a certain string, possibly triggering a buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0724

Publication date:
24/09/2002
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0647

Publication date:
24/09/2002
Buffer overflow in a legacy ActiveX control used to display specially formatted text in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code, aka "Buffer Overrun in Legacy Text Formatting ActiveX Control".
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0648

Publication date:
24/09/2002
The legacy data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0691

Publication date:
24/09/2002
Microsoft Internet Explorer 5.01 and 5.5 allows remote attackers to execute scripts in the Local Computer zone via a URL that references a local HTML resource file, a variant of "Cross-Site Scripting in Local HTML Resource" as identified by CAN-2002-0189.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0722

Publication date:
24/09/2002
Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0723

Publication date:
24/09/2002
Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote attackers to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0976

Publication date:
24/09/2002
Internet Explorer 4.0 and later allows remote attackers to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0980

Publication date:
24/09/2002
The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mhtml: URL.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2002-0974

Publication date:
24/09/2002
Help and Support Center for Windows XP allows remote attackers to delete arbitrary files via a link to the hcp: protocol that accesses uplddrvinfo.htm.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026