Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-1111

Publication date:
11/08/2021
Bootloader contains a vulnerability in the NV3P server where any user with physical access through USB can trigger an incorrect bounds check, which may lead to buffer overflow, resulting in limited information disclosure, limited data integrity, and denial of service across all components.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2022

CVE-2021-1108

Publication date:
11/08/2021
NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2022

CVE-2021-1107

Publication date:
11/08/2021
NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVMAP_IOC_WRITE* paths, where improper access controls may lead to code execution, complete denial of service, and seriously compromised integrity of all system components.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2022

CVE-2021-38567

Publication date:
11/08/2021
An issue was discovered in Foxit PDF Editor before 11.0.1 and PDF Reader before 11.0.1 on macOS. It mishandles missing dictionary entries, leading to a NULL pointer dereference, aka CNVD-C-2021-95204.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-1106

Publication date:
11/08/2021
NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2022

CVE-2020-25563

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to create local administrator on any client without requiring any credentials by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature and not having a JSESSIONID.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-25562

Publication date:
11/08/2021
In SapphireIMS 5.0, there is no CSRF token present in the entire application. This can lead to CSRF vulnerabilities in critical application forms like account resent.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-25561

Publication date:
11/08/2021
SapphireIMS 5 utilized default sapphire:ims credentials to connect the client to server. This credential is saved in ServerConf.config file in the client.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2021

CVE-2020-25565

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2021

CVE-2021-22098

Publication date:
11/08/2021
UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection of UAA users to a malicious sites.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2021

CVE-2020-25564

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2020-25566

Publication date:
11/08/2021
In SapphireIMS 5.0, it is possible to take over an account by sending a request to the Save_Password form as shown in POC. Notice that we do not require a JSESSIONID in this request and can reset any user’s password by changing the username to that user and password to base64(desired password).
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022