Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2008-0815

Publication date:
19/02/2008
SQL injection vulnerability in the com_mezun component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit task.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2018

CVE-2008-0816

Publication date:
19/02/2008
SQL injection vulnerability in the com_sg component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the pid parameter in an order task.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2018

CVE-2008-0817

Publication date:
19/02/2008
SQL injection vulnerability in the com_filebase component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in a selectfolder action.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2018

CVE-2008-0808

Publication date:
19/02/2008
Cross-site scripting (XSS) vulnerability in the meta plugin in Ikiwiki before 1.1.47 allows remote attackers to inject arbitrary web script or HTML via meta tags.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2008-0809

Publication date:
19/02/2008
Cross-site scripting (XSS) vulnerability in the htmlscrubber in Ikiwiki before 1.1.46 allows remote attackers to inject arbitrary web script or HTML via title contents.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2008-0807

Publication date:
19/02/2008
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2011

CVE-2008-0806

Publication date:
19/02/2008
wyrd 1.4.3b allows local users to overwrite arbitrary files via a symlink attack on the wyrd-tmp.[USERID] temporary file.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2008

CVE-2008-0804

Publication date:
19/02/2008
PHP remote file inclusion vulnerability in usrgetform.html in Thecus N5200Pro NAS Server allows remote attackers to execute arbitrary PHP code via a URL in the name parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2017

CVE-2008-0805

Publication date:
19/02/2008
Unrestricted file upload vulnerability in image.php in PHPizabi 0.848b C1 HFP1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension from the event page, then accessing it via a direct request to the file in system/cache/pictures.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2017

CVE-2008-0556

Publication date:
19/02/2008
Cross-site request forgery (CSRF) vulnerability in OpenCA PKI 0.9.2.5, and possibly earlier versions, allows remote attackers to perform unauthorized actions as authorized users via a link or IMG tag to RAServer.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2017

CVE-2007-6258

Publication date:
19/02/2008
Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2008-0674

Publication date:
18/02/2008
Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2018