Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-1685

Publication date:
20/05/2005
episodex guestbook allows remote attackers to bypass authentication and edit scripts via a direct request to admin.asp.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1687

Publication date:
20/05/2005
SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1688

Publication date:
20/05/2005
Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1686

Publication date:
20/05/2005
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1672

Publication date:
19/05/2005
Multiple cross-site scripting (XSS) vulnerabilities in Help Center Live allow remote attackers to inject arbitrary web script or HTML via the (1) find parameter to index.php, (2) name or (3) message field of a chat request, or (4) the message body when opening a trouble ticket.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1673

Publication date:
19/05/2005
Multiple SQL injection vulnerabilities in Help Center Live allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to index.php, (2) tid parameter to view.php, fid parameter to (3) download.php or (4) chat_download.php, (5) status parameter to icon.php, TICKET_tid parameter to (6) index.php or (7) view.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1674

Publication date:
19/05/2005
Cross-Site Request Forgery (CSRF) vulnerability in Help Center Live allows remote attackers to perform actions as the administrator via a link or IMG tag to view.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1472

Publication date:
19/05/2005
Certain system calls in Apple Mac OS X 10.4.1 do not properly enforce the permissions of certain directories without the POSIX read bit set, but with the execute bits set for group or other, which allows local users to list files in otherwise restricted directories.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-0392

Publication date:
19/05/2005
ppxp does not drop root privileges before opening log files, which allows local users to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1671

Publication date:
19/05/2005
The Logfile feature in Yahoo! Messenger 5.x through 6.0 can be activated by a YMSGR: URL and writes all output to a single ypager.log file, even when there are multiple users, and does not properly warn later users that the feature has been enabled, which allows local users to obtain sensitive information from other users.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-0040

Publication date:
19/05/2005
Multiple cross-site scripting (XSS) vulnerabilities in DotNetNuke before 3.0.12 allow remote attackers to inject arbitrary web script or HTML via the (1) register a new user page, (2) User-Agent, or (3) Username, which is not properly quoted before sending to the error log.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2005-1670

Publication date:
19/05/2005
Unknown vulnerability in Extreme BlackDiamond 10808 and 8800 switches running ExtremeWare XOS 11.1 before 11.1.3.3, 11.0 before 11.0.2.4, and 10.x allows remote authenticated users to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025