Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1666

Publication date:
24/06/2022
The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2022

CVE-2022-1667

Publication date:
24/06/2022
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2022

CVE-2022-1668

Publication date:
24/06/2022
Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2022

CVE-2022-1518

Publication date:
24/06/2022
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2022

CVE-2022-1519

Publication date:
24/06/2022
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2022

CVE-2022-1524

Publication date:
24/06/2022
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2022

CVE-2022-1745

Publication date:
24/06/2022
The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-1744

Publication date:
24/06/2022
Applications on the tested version of Dominion Voting Systems ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-1743

Publication date:
24/06/2022
The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-1742

Publication date:
24/06/2022
The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-1739

Publication date:
24/06/2022
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2021-30651

Publication date:
24/06/2022
A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023