Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2002-1972

Publication date:
31/12/2002
Unknown vulnerability in Parallel port powerSwitch (aka pp_powerSwitch) 0.1 does not properly enforce access controls, which allows local users to access arbitrary ports.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1974

Publication date:
31/12/2002
The FTP service in Zaurus PDAs SL-5000D and SL-5500 does not require authentication, which allows remote attackers to access the file system as root.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1976

Publication date:
31/12/2002
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1977

Publication date:
31/12/2002
Network Associates PGP 7.0.4 and 7.1 does not time out according to the value set in the "Passphrase Cache" option, which could allow attackers to open encrypted files without providing a passphrase.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1981

Publication date:
31/12/2002
Microsoft SQL Server 2000 through SQL Server 2000 SP2 allows the "public" role to execute the (1) sp_MSSetServerProperties or (2) sp_MSsetalertinfo stored procedures, which allows attackers to modify configuration including SQL server startup and alert settings.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1982

Publication date:
31/12/2002
Directory traversal vulnerability in the list_directory function in Icecast 1.3.12 allows remote attackers to determine if a directory exists via a .. (dot dot) in the GET request, which returns different error messages depending on whether the directory exists or not.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1985

Publication date:
31/12/2002
iSMTP 5.0.1 allows remote attackers to cause a denial of service via a long "MAIL FROM" command, possibly triggering a buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1986

Publication date:
31/12/2002
Perception LiteServe 2.0 through 2.0.1 allows remote attackers to obtain the source code of CGI scripts via an HTTP request with a trailing dot (".").
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1987

Publication date:
31/12/2002
Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1988

Publication date:
31/12/2002
Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1989

Publication date:
31/12/2002
Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-1990

Publication date:
31/12/2002
Resin 2.0.5 through 2.1.2 allows remote attackers to reveal physical path information via a URL request for the example Java class file HelloServlet.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025