Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2001-0966

Publication date:
31/08/2001
Directory traversal vulnerability in Nudester 1.10 and earlier allows remote attackers to read or write arbitrary files via a .. (dot dot) in the CD (CWD) command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0967

Publication date:
31/08/2001
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0968

Publication date:
31/08/2001
Knox Arkeia server 4.2, and possibly other versions, installs its root user with a null password by default, which allows local and remote users to gain privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0971

Publication date:
31/08/2001
Directory traversal vulnerability in ACI 4d webserver allows remote attackers to read arbitrary files via a .. (dot dot) or drive letter (e.g., C:) in an HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0973

Publication date:
31/08/2001
BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-0976

Publication date:
31/08/2001
Vulnerability in HP Process Resource Manager (PRM) C.01.08.2 and earlier, as used by HP-UX Workload Manager (WLM), allows local users to gain root privileges via modified libraries or environment variables.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1004

Publication date:
31/08/2001
Cross-site scripting (CSS) vulnerability in gnut Gnutella client before 0.4.27 allows remote attackers to execute arbitrary script on other clients by sharing a file whose name contains the script tags.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1005

Publication date:
31/08/2001
Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA uses weak encryption to store the user password in a registry key, which allows attackers who have access to the registry key to decrypt the password and gain privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1006

Publication date:
31/08/2001
Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA does not encrypt sensitive files and relies solely on its password feature to restrict access, which allows an attacker to read the files using a different application.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1007

Publication date:
31/08/2001
Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA uses a small keyspace for device keys and does not impose a delay when an incorrect key is entered, which allows attackers to more quickly guess the key via a brute force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1008

Publication date:
31/08/2001
Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2001-1025

Publication date:
31/08/2001
PHP-Nuke 5.x allows remote attackers to perform arbitrary SQL operations by modifying the "prefix" variable when calling any scripts that do not already define the prefix variable (e.g., by including mainfile.php), such as article.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025