Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2003-1035

Publication date:
15/04/2004
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1036

Publication date:
15/04/2004
Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1037

Publication date:
15/04/2004
Format string vulnerability in the WGate component for SAP Internet Transaction Server (ITS) allows remote attackers to execute arbitrary code via a high "trace level."
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1038

Publication date:
15/04/2004
The AGate component for SAP Internet Transaction Server (ITS) allows remote attackers to obtain sensitive information via a ~command parameter with an AgateInstallCheck value, which provides a list of installed DLLs and full pathnames.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1039

Publication date:
15/04/2004
Multiple buffer overflows in the mySAP.com architecture for SAP allow remote attackers to execute arbitrary code via a long HTTP Host header to (1) Message Server, (2) Web Dispatcher, or (3) Application Server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2003-1040

Publication date:
15/04/2004
kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of service (crash) by sending certain signals to kmod.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0362

Publication date:
15/04/2004
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0363

Publication date:
15/04/2004
Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0364

Publication date:
15/04/2004
The WrapNISUM ActiveX component (WrapUM.dll) in Norton Internet Security 2004 is marked safe for scripting, which allows remote attackers to execute arbitrary programs via the LaunchURL method.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0372

Publication date:
15/04/2004
xine allows local users to overwrite arbitrary files via a symlink attack on a bug report email that is generated by the (1) xine-bugreport or (2) xine-check scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0151

Publication date:
15/04/2004
Unknown vulnerability in xitalk 1.1.11 and earlier allows local users to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2004-0152

Publication date:
15/04/2004
Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025