Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-1144

Publication date:
11/07/2001
Directory traversal vulnerability in McAfee ASaP VirusScan agent 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1143

Publication date:
11/07/2001
IBM DB2 7.0 allows a remote attacker to cause a denial of service (crash) via a single byte to (1) db2ccs.exe on port 6790, or (2) db2jds.exe on port 6789.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1240

Publication date:
11/07/2001
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1038

Publication date:
11/07/2001
Cisco SN 5420 Storage Router 1.1(3) and earlier allows remote attackers to cause a denial of service (reboot) via a series of connections to TCP port 8023.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1141

Publication date:
10/07/2001
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1180

Publication date:
10/07/2001
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1322

Publication date:
10/07/2001
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1158

Publication date:
09/07/2001
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1026

Publication date:
09/07/2001
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1245

Publication date:
09/07/2001
Opera 5.0 for Linux does not properly handle malformed HTTP headers, which allows remote attackers to cause a denial of service, possibly with a header whose value is the same as a MIME header name.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1244

Publication date:
07/07/2001
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1045

Publication date:
06/07/2001
Directory traversal vulnerability in basilix.php3 in Basilix Webmail 1.0.3beta and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the request_id[DUMMY] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025