Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2005-1543

Publication date:
25/05/2005
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2017

CVE-2005-1751

Publication date:
25/05/2005
Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2018

CVE-2005-1734

Publication date:
24/05/2005
Multiple SQL injection vulnerabilities in PROMS before 0.11 allow remote attackers to execute arbitrary SQL commands via unknown vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1735

Publication date:
24/05/2005
Multiple cross-site scripting (XSS) vulnerabilities in PROMS before 0.11 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1736

Publication date:
24/05/2005
PROMS 0.11 does not properly handle "certain combinations of rights," which gives more rights to users than intended.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1738

Publication date:
24/05/2005
Format string vulnerability in the logPrintBadfile function in delbadfiles.c Iron Bars SHell (ibsh) before 0.3d allows users to "access files outside the home directory" and possibly execute arbitrary code via certain inputs that are not properly handled in a syslog call.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1706

Publication date:
24/05/2005
Unknown vulnerability in MailScanner 4.41.3 and earlier, related to "incomplete reporting of viruses in zip files," allows remote attackers to bypass virus detection.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1711

Publication date:
24/05/2005
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1712

Publication date:
24/05/2005
Unknown vulnerability in Serendipity 0.8, when used with multiple authors, allows unprivileged authors to upload arbitrary media files.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1713

Publication date:
24/05/2005
Multiple cross-site scripting (XSS) vulnerabilities in Serendipity 0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) templatedropdown and (2) shoutbox plugins.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1715

Publication date:
24/05/2005
Cross-site scripting (XSS) vulnerability in index.php for TOPo 2.2 (2.2.178) allows remote attackers to inject arbitrary web script or HTML via the (1) m, (2) s, (3) ID, or (4) t parameters, or the (5) field name, (6) Your Web field, or (7) email field in the comments section.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2005-1716

Publication date:
24/05/2005
TOPo 2.2 (2.2.178) stores data files in the data directory under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as client IP addresses.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008