Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-2725

Publication date:
30/08/2005
The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2726

Publication date:
30/08/2005
Directory traversal vulnerability in Home Ftp Server 1.0.7 allows remote authenticated users to read arbitrary files via "C:\" (Windows drive letter) sequences in commands such as (1) LIST or (2) RETR.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2727

Publication date:
30/08/2005
Home Ftp Server 1.0.7 stores sensitive user information and server information in the same directory as the user's home directory, which allows remote authenticated users to obtain sensitive information by obtaining ftpmembers.lst and ftpsettings.lst.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2729

Publication date:
30/08/2005
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote attackers to bypass firewall rules and connect to local services.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2730

Publication date:
30/08/2005
The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2733

Publication date:
30/08/2005
upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2734

Publication date:
30/08/2005
Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2735

Publication date:
30/08/2005
Cross-site scripting (XSS) vulnerability in phpGraphy 0.9.9a and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2736

Publication date:
30/08/2005
Cross-site scripting (XSS) vulnerability in YaPig 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2737

Publication date:
30/08/2005
Cross-site scripting (XSS) vulnerability in PhotoPost PHP Pro 5.1 allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-2718

Publication date:
29/08/2005
Buffer overflow in ad_pcm.c in MPlayer 1.0pre7 and earlier allows remote attackers to execute arbitrary code via crafted PCM audio data, as demonstrated using a video file with an audio header containing a large value in a stream format (strf) chunk.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2016

CVE-2005-2716

Publication date:
29/08/2005
The event_pin_code_request function in the btsrv daemon (btsrv.c) in Nokia Affix 2.1.2 and 3.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a Bluetooth device name.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017