Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-2801

Publication date:
06/09/2005
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2800

Publication date:
06/09/2005
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2770

Publication date:
02/09/2005
WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) does not properly handle when the Windows Administrator or Guest accounts are renamed after SSH key authentication has been configured, which allows remote attackers to use the original names during login.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2771

Publication date:
02/09/2005
WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) processes access and deny lists in a case-sensitive manner, when previous versions were case-insensitive, which might allow remote attackers to bypass intended restrictions and login to accounts that should be denied.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2778

Publication date:
02/09/2005
SQL injection vulnerability in member.php in MyBulletinBoard (MyBB) allows remote attackers to execute arbitrary SQL statements via the fid parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2779

Publication date:
02/09/2005
The iTAN Online-Banking Security System allows remote attackers to obtain TAN numbers via a man-in-the-middle (MITM) attack while the transaction is taking place, which facilitates a "phishing" attack.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2780

Publication date:
02/09/2005
Cross-site scripting (XSS) vulnerability in Land Down Under (LDU) allows remote attackers to inject arbitrary web script or HTML via a signature.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2786

Publication date:
02/09/2005
Directory traversal vulnerability in bestmail_edit.cgi in cosmoshop 8.10.78 and earlier allows remote administrators to read arbitrary files via ".." sequences in the file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2767

Publication date:
02/09/2005
Buffer overflow in LeapFTP allows remote attackers to execute arbitrary code via a long Host string in a Site Queue (.lsq) file.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2768

Publication date:
02/09/2005
Heap-based buffer overflow in the Sophos Antivirus Library, as used by Sophos Antivirus, PureMessage, MailMonitor, and other products, allows remote attackers to execute arbitrary code via a Visio file with a crafted sub record length.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2772

Publication date:
02/09/2005
Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long "+VIEWS:" reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2005-2774

Publication date:
02/09/2005
Format string vulnerability in Lithium II mod 1.24 for Quake 2 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in the nickname.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026