Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-1999-0860

Publication date:
01/12/1999
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0846

Publication date:
01/12/1999
Denial of service in MDaemon 2.7 via a large number of connection attempts.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0856

Publication date:
01/12/1999
login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0822

Publication date:
30/11/1999
Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0824

Publication date:
30/11/1999
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0840

Publication date:
30/11/1999
Buffer overflow in CDE dtmail and dtmailpr programs allows local users to gain privileges via a long -f option.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0841

Publication date:
30/11/1999
Buffer overflow in CDE mailtool allows local users to gain root privileges via a long MIME Content-Type.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0847

Publication date:
29/11/1999
Buffer overflow in free internet chess server (FICS) program, xboard.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0387

Publication date:
29/11/1999
A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to read plaintext network passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0839

Publication date:
29/11/1999
Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0842

Publication date:
29/11/1999
Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-1547

Publication date:
25/11/1999
Oracle Web Listener 2.1 allows remote attackers to bypass access restrictions by replacing a character in the URL with its HTTP-encoded (hex) equivalent.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025