Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-25565

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2021

CVE-2021-22098

Publication date:
11/08/2021
UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection of UAA users to a malicious sites.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2021

CVE-2020-25564

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2020-25566

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to take over an account by sending a request to the Save_Password form as shown in POC. Notice that we do not require a JSESSIONID in this request and can reset any user’s password by changing the username to that user and password to base64(desired password).
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2020-25560

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2017-16632

Publication date:
11/08/2021
In SapphireIMS 4097_1, the password in the database is stored in Base64 format.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2017-16631

Publication date:
11/08/2021
In SapphireIMS 4097_1, a guest user is able to change the password of an administrative user by utilizing an Insecure Direct Object Reference (IDOR) in the "Account Password Reset" functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2017-16630

Publication date:
11/08/2021
In SapphireIMS 4097_1, a guest user can create a local administrator account on any system that has SapphireIMS installed, because of an Insecure Direct Object Reference (IDOR) in the local user creation function.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-21359

Publication date:
11/08/2021
An arbitrary file upload vulnerability in the Template Upload function of Maccms10 allows attackers bypass the suffix whitelist verification to execute arbitrary code via adding a character to the end of the uploaded file's name.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-21363

Publication date:
11/08/2021
An arbitrary file deletion vulnerability exists within Maccms10.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2017-16629

Publication date:
11/08/2021
In SapphireIMS 4097_1, it is possible to guess the registered/active usernames of the software from the errors it gives out for each type of user on the Login form. For "Incorrect User" - it gives an error "The application failed to identify the user. Please contact administrator for help." For "Correct User and Incorrect Password" - it gives an error "Authentication failed. Please login again."
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2021

CVE-2020-21362

Publication date:
11/08/2021
A cross site scripting (XSS) vulnerability in the background search function of Maccms10 allows attackers to execute arbitrary web scripts or HTML via the 'wd' parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
13/08/2021