Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-6413

Publication date:
24/09/2016
The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6412

Publication date:
24/09/2016
The Cisco Application-hosting Framework (CAF) component in Cisco IOS 15.6(1)T1 and IOS XE, when the IOx feature set is enabled, allows man-in-the-middle attackers to trigger arbitrary downloads via crafted HTTP headers, aka Bug ID CSCuz84773.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6411

Publication date:
24/09/2016
Cisco Firepower Management Center and FireSIGHT System Software 6.0.1 mishandle comparisons between URLs and X.509 certificates, which allows remote attackers to bypass intended do-not-decrypt settings via a crafted URL, aka Bug ID CSCva50585.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6410

Publication date:
24/09/2016
The Cisco Application-hosting Framework (CAF) component in Cisco IOS 15.6(1)T1 and IOS XE, when the IOx feature set is enabled, allows remote authenticated users to read arbitrary files via unspecified vectors, aka Bug ID CSCuy19856.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6409

Publication date:
24/09/2016
The Data in Motion (DMo) component in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service (out-of-bounds access) via crafted traffic, aka Bug ID CSCuy54015.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6408

Publication date:
24/09/2016
Cisco Prime Home 5.2.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCvb17814.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6414

Publication date:
22/09/2016
iox in Cisco IOS, possibly 15.6 and earlier, and IOS XE, possibly 3.18 and earlier, allows local users to execute arbitrary IOx Linux commands on the guest OS via crafted iox command-line options, aka Bug ID CSCuz59223.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6406

Publication date:
22/09/2016
Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6374

Publication date:
22/09/2016
Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote attackers to execute arbitrary code via a crafted dnslookup command in an HTTP request, aka Bug ID CSCuz89093.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6373

Publication date:
22/09/2016
The web-based GUI in Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote authenticated administrators to execute arbitrary OS commands as root via crafted platform commands, aka Bug ID CSCva00541.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-5283

Publication date:
22/09/2016
Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-5284

Publication date:
22/09/2016
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025