Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-2948

Publication date:
16/09/2005
KillProcess 2.20 and earlier allows local users to bypass kill list restrictions by launching multiple processes at the same time, which are not all killed by KillProcess.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2949

Publication date:
16/09/2005
pam_per_user before 0.4 does not verify if the user name changes between authentication attempts and uses the same subrequest handle, which allows remote attackers or local users to login as other users by using certain applications that allow the username to be changed during authentication, such as /bin/login.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2953

Publication date:
16/09/2005
Cross-site scripting (XSS) vulnerability in merchant.mvc in MIVA Merchant 5 allows remote attackers to inject arbitrary web script or HTML via the Customer_Login parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2955

Publication date:
16/09/2005
config.inc.php in ATutor 1.5.1, and possibly earlier versions, uses an incomplete blacklist to check for dangerous file extensions, which allows authenticated administrators or educators to execute arbitrary code by uploading files with other executable extensions such as .inc, .php4, or others.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2956

Publication date:
16/09/2005
ATutor 1.5.1, and possibly earlier versions, stores temporary chat logs under the web document root with insufficient access control and predictable filenames, which allows remote attackers to obtain user chat conversations via direct requests to those files.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2957

Publication date:
16/09/2005
Stack-based buffer overflow in AVIRA Desktop for Windows 1.00.00.68 with AVPACK32.DLL 6.31.0.3, when archive scanning is enabled, allows remote attackers to execute arbitrary code via a long filename in an ACE archive.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2946

Publication date:
16/09/2005
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2945

Publication date:
16/09/2005
arc 5.21j and earlier create temporary files with world-readable permissions, which allows local users to read sensitive information from files created by (1) arc (arc.c) or (2) marc (marc.c).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2877

Publication date:
16/09/2005
The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2944

Publication date:
16/09/2005
The perform_file_save function in GNOME Workstation Command Center (gwcc) 0.9.6 and earlier allows local users to create and overwrite arbitrary files via a symlink attack on the gwcc_out.txt temporary file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2935

Publication date:
15/09/2005
Unquoted Windows search path vulnerability in Microsoft AntiSpyware might allow local users to execute code via a malicious c:\program.exe file, which is run by AntiSpywareMain.exe when it attempts to execute gsasDtServ.exe. NOTE: it is not clear whether this overlaps CVE-2005-2940.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-2495

Publication date:
15/09/2005
Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025