Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2002-0396

Publication date:
26/07/2002
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0397

Publication date:
26/07/2002
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0398

Publication date:
26/07/2002
Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0436

Publication date:
26/07/2002
sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0443

Publication date:
26/07/2002
Microsoft Windows 2000 allows local users to bypass the policy that prohibits reusing old passwords by changing the current password before it expires, which does not enable the check for previous passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0642

Publication date:
23/07/2002
The registry key containing the SQL Server service account information in Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, has insecure permissions, which allows local users to gain privileges, aka "Incorrect Permission on SQL Server Service Account Registry Key."
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0643

Publication date:
23/07/2002
The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System."
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0667

Publication date:
23/07/2002
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 has a default null administrator password, which could allow remote attackers to gain access to the phone.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0668

Publication date:
23/07/2002
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows authenticated users to modify the Call Forwarding settings and hijack calls.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0670

Publication date:
23/07/2002
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 uses Base64 encoded usernames and passwords for HTTP basic authentication, which allows remote attackers to steal and easily decode the passwords via sniffing.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0671

Publication date:
23/07/2002
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 downloads phone applications from a web site but can not verify the integrity of the applications, which could allow remote attackers to install Trojan horse applications via DNS spoofing.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2002-0672

Publication date:
23/07/2002
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to restore the phone to factory defaults without authentication via a menu option, which sets the administrator password to null.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025