Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2000-0882

Publication date:
14/11/2000
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed ICMP packet, which causes the CPU to crash.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0844

Publication date:
14/11/2000
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0804

Publication date:
14/11/2000
Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0805

Publication date:
14/11/2000
Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0806

Publication date:
14/11/2000
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0807

Publication date:
14/11/2000
The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0808

Publication date:
14/11/2000
The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0809

Publication date:
14/11/2000
Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0813

Publication date:
14/11/2000
Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass."
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0824

Publication date:
14/11/2000
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0825

Publication date:
14/11/2000
Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2000-0829

Publication date:
14/11/2000
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026