Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2000-0430

Publication date:
03/05/2000
Cart32 allows remote attackers to access sensitive debugging information by appending /expdate to the URL request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0303

Publication date:
03/05/2000
Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0335

Publication date:
03/05/2000
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0378

Publication date:
03/05/2000
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0425

Publication date:
03/05/2000
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0332

Publication date:
03/05/2000
UltraBoard.pl or UltraBoard.cgi CGI scripts in UltraBoard 1.6 allows remote attackers to read arbitrary files via a pathname string that includes a dot dot (..) and ends with a null byte.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0345

Publication date:
03/05/2000
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0138

Publication date:
02/05/2000
A system has a distributed denial of service (DDOS) attack master, agent, or zombie installed, such as (1) Trinoo, (2) Tribe Flood Network (TFN), (3) Tribe Flood Network 2000 (TFN2K), (4) stacheldraht, (5) mstream, or (6) shaft.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0347

Publication date:
02/05/2000
Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0293

Publication date:
02/05/2000
aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0385

Publication date:
02/05/2000
FileMaker Pro 5 Web Companion allows remote attackers to bypass Field-Level database security restrictions via the XML publishing or email capabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2000-0386

Publication date:
02/05/2000
FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025