Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-6346

Publication date:
07/09/2016
RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6345

Publication date:
07/09/2016
RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6344

Publication date:
07/09/2016
Red Hat JBoss BPM Suite 6.3.x does not include the HTTPOnly flag in a Set-Cookie header for session cookies, which makes it easier for remote attackers to obtain potentially sensitive information via script access to the cookies.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-7153

Publication date:
06/09/2016
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-7152

Publication date:
06/09/2016
The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-7114

Publication date:
06/09/2016
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-7113

Publication date:
06/09/2016
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-7112

Publication date:
06/09/2016
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-6377

Publication date:
03/09/2016
Media Origination System Suite Software 2.6 and earlier in Cisco Virtual Media Packager (VMP) allows remote attackers to bypass authentication and make arbitrary Platform and Applications Manager (PAM) API calls via unspecified vectors, aka Bug ID CSCuz52110.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-5430

Publication date:
03/09/2016
The RSA 1.5 algorithm implementation in the JOSE_JWE class in JWE.php in jose-php before 2.2.1 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-5429

Publication date:
03/09/2016
jose-php before 2.2.1 does not use constant-time operations for HMAC comparison, which makes it easier for remote attackers to obtain sensitive information via a timing attack, related to JWE.php and JWS.php.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2016-1464

Publication date:
03/09/2016
Cisco WebEx Meetings Player T29.10, when WRF file support is enabled, allows remote attackers to execute arbitrary code via a crafted file, aka Bug ID CSCva09375.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025