Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-1679

Publication date:
20/05/2005
Stack-based buffer overflow in the error directive in picasm 1.12b and earlier allows attackers to execute arbitrary code via a long error message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1680

Publication date:
20/05/2005
D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1681

Publication date:
20/05/2005
PHP remote file inclusion vulnerability in common.php in phpATM 1.21, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code via a URL in the include_location parameter to index.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1682

Publication date:
20/05/2005
JavaMail API, as used by Solstice Internet Mail Server POP3 2.0, does not properly validate the message number in the MimeMessage constructor in javax.mail.internet.InternetHeaders, which allows remote authenticated users to read other users' e-mail messages by modifying the msgno parameter. NOTE: Sun disputes this issue, stating "The report makes references to source code and files that do not exist in the mentioned products.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1683

Publication date:
20/05/2005
Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1684

Publication date:
20/05/2005
Cross-site scripting (XSS) vulnerability in default.asp for episodex guestbook allows remote attackers to inject arbitrary web script or HTML via the Name field and other fields.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1685

Publication date:
20/05/2005
episodex guestbook allows remote attackers to bypass authentication and edit scripts via a direct request to admin.asp.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1687

Publication date:
20/05/2005
SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1688

Publication date:
20/05/2005
Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1686

Publication date:
20/05/2005
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1672

Publication date:
19/05/2005
Multiple cross-site scripting (XSS) vulnerabilities in Help Center Live allow remote attackers to inject arbitrary web script or HTML via the (1) find parameter to index.php, (2) name or (3) message field of a chat request, or (4) the message body when opening a trouble ticket.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1673

Publication date:
19/05/2005
Multiple SQL injection vulnerabilities in Help Center Live allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to index.php, (2) tid parameter to view.php, fid parameter to (3) download.php or (4) chat_download.php, (5) status parameter to icon.php, TICKET_tid parameter to (6) index.php or (7) view.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025