Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-1999-0285

Publication date:
01/01/1999
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0286

Publication date:
01/01/1999
In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0355

Publication date:
01/01/1999
Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0361

Publication date:
01/01/1999
NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0394

Publication date:
01/01/1999
DPEC Online Courseware allows an attacker to change another user's password without knowing the original password.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0397

Publication date:
01/01/1999
The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0398

Publication date:
01/01/1999
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0399

Publication date:
01/01/1999
The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0401

Publication date:
01/01/1999
A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0448

Publication date:
01/01/1999
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0452

Publication date:
01/01/1999
A service or application has a backdoor password that was placed there by the developer.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0453

Publication date:
01/01/1999
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025