Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-41825

Publication date:
08/10/2021
Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML injection via the /wfo/control/signin username parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2022

CVE-2021-41916

Publication date:
08/10/2021
A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41917

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an authenticated user to store arbitrary web script or HTML by creating or editing a client name in the clients section, due to incorrect sanitization of user-supplied data and achieve a Stored Cross-Site Scripting attack against the platform users and administrators. The affected endpoint is /clients/editclient.php, on the HTTP POST cn parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41918

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an authenticated user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against the platform users and administrators. The issue affects every endpoint on the application because it is related on how each URL is echoed back on every response page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41919

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41920

Publication date:
08/10/2021
webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41567

Publication date:
08/10/2021
The new add subject parameter of Tad Uploader view book list function fails to filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021

CVE-2021-41974

Publication date:
08/10/2021
Tad Book3 editing book page does not perform identity verification. Remote attackers can use the vulnerability to view and modify arbitrary content of books without permission.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2021-41976

Publication date:
08/10/2021
Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41975

Publication date:
08/10/2021
TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41568

Publication date:
08/10/2021
Tad Web is vulnerable to authorization bypass, thus remote attackers can exploit the vulnerability to use the original function of viewing bulletin boards and uploading files in the system.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2021-41563

Publication date:
08/10/2021
Tad Book3 editing book function does not filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2021