Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-41919

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41920

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41567

Publication date:
08/10/2021
The new add subject parameter of Tad Uploader view book list function fails to filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41974

Publication date:
08/10/2021
Tad Book3 editing book page does not perform identity verification. Remote attackers can use the vulnerability to view and modify arbitrary content of books without permission.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2021-41976

Publication date:
08/10/2021
Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41975

Publication date:
08/10/2021
TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41568

Publication date:
08/10/2021
Tad Web is vulnerable to authorization bypass, thus remote attackers can exploit the vulnerability to use the original function of viewing bulletin boards and uploading files in the system.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41563

Publication date:
08/10/2021
Tad Book3 editing book function does not filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41566

Publication date:
08/10/2021
The file extension of the TadTools file upload function fails to filter, thus remote attackers can upload any types of files and execute arbitrary code without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41565

Publication date:
08/10/2021
TadTools special page parameter does not properly restrict the input of specific characters, thus remote attackers can inject JavaScript syntax without logging in, and further perform reflective XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41564

Publication date:
08/10/2021
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2023

CVE-2021-3312

Publication date:
08/10/2021
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021