Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-1999-0988

Publication date:
04/12/1999
UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0865

Publication date:
03/12/1999
Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0866

Publication date:
03/12/1999
Buffer overflow in UnixWare xauto program allows local users to gain root privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0139

Publication date:
03/12/1999
Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed RETR command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0825

Publication date:
03/12/1999
The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0357

Publication date:
03/12/1999
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0358

Publication date:
03/12/1999
ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0864

Publication date:
03/12/1999
UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0828

Publication date:
02/12/1999
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0850

Publication date:
02/12/1999
The default permissions for Endymion MailMan allow local users to read email or modify files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0852

Publication date:
02/12/1999
IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0366

Publication date:
02/12/1999
dump in Debian GNU/Linux 2.1 does not properly restore symlinks, which allows a local user to modify the ownership of arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025