Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-1999-0561

Publication date:
01/01/1999
IIS has the #exec function enabled for Server Side Include (SSI) files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0565

Publication date:
01/01/1999
A Sendmail alias allows input to be piped to a program.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0569

Publication date:
01/01/1999
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0577

Publication date:
01/01/1999
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0580

Publication date:
01/01/1999
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0581

Publication date:
01/01/1999
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0586

Publication date:
01/01/1999
A network service is running on a nonstandard port.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0587

Publication date:
01/01/1999
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0589

Publication date:
01/01/1999
A system-critical Windows NT registry key has inappropriate permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0591

Publication date:
01/01/1999
An event log in Windows NT has inappropriate access permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0603

Publication date:
01/01/1999
In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-1999-0611

Publication date:
01/01/1999
A system-critical Windows NT registry key has an inappropriate value.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025