Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-1479

Publication date:
31/12/2001
smcboot in Sun SMC (Sun Management Center) 2.0 in Solaris 8 allows local users to delete arbitrary files via a symlink attack on /tmp/smc$SMC_PORT.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1480

Publication date:
31/12/2001
Java Runtime Environment (JRE) and SDK 1.2 through 1.3.0_04 allows untrusted applets to access the system clipboard.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1484

Publication date:
31/12/2001
Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1487

Publication date:
31/12/2001
popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1488

Publication date:
31/12/2001
Open Projects Network Internet Relay Chat (IRC) daemon u2.10.05.18 does not perform a double-reverse DNS lookup, which allows remote attackers to spoof any valid hostname on the Internet. NOTE: a followup post suggests that this is not an issue in the daemon.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1489

Publication date:
31/12/2001
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (CPU consumption and memory leak) via a web page with a large number of images.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1490

Publication date:
31/12/2001
Mozilla 0.9.6 allows remote attackers to cause a denial of service (CPU consumption and memory leak) via a web page with a large number of images.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1491

Publication date:
31/12/2001
Opera 5.11 allows remote attackers to cause a denial of service (CPU consumption and memory leak) via a web page with a large number of images.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1499

Publication date:
31/12/2001
Check Point VPN-1 4.1SP4 using SecuRemote returns different error messages for valid and invalid users, with prompts that vary depending on the authentication method being used, which makes it easier for remote attackers to conduct brute force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1502

Publication date:
31/12/2001
webcart.cgi in Mountain Network Systems WebCart 8.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the NEXTPAGE parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1504

Publication date:
31/12/2001
Lotus Notes R5 Client 4.6 allows remote attackers to execute arbitrary commands via a Lotus Notes object with code in an event, which is automatically executed when the user processes the e-mail message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1505

Publication date:
31/12/2001
tinc 1.0pre3 and 1.0pre4 allows remote attackers to inject data into user sessions by sniffing and replaying packets.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025