Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-1999-1268

Publication date:
06/01/1999
Vulnerability in KDE konsole allows local users to hijack or observe sessions of other users by accessing certain devices.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0458

Publication date:
06/01/1999
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0391

Publication date:
05/01/1999
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0464

Publication date:
04/01/1999
Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0390

Publication date:
04/01/1999
Buffer overflow in Dosemu Slang library in Linux.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0389

Publication date:
03/01/1999
Buffer overflow in the bootp server in the Debian Linux netstd package.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0914

Publication date:
03/01/1999
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0054

Publication date:
03/01/1999
search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0005

Publication date:
02/01/1999
HP-UX aserver program allows local users to gain privileges via a symlink attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-1422

Publication date:
02/01/1999
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-1170

Publication date:
02/01/1999
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0402

Publication date:
02/01/1999
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025