Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11206

Publication date:
14/05/2019
The Spotfire library component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace, and TIBCO Spotfire Server contains vulnerabilities that theoretically allow a malicious user to undermine the integrity of comments and bookmarks. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 10.2.0, and TIBCO Spotfire Server: versions up to and including 7.11.2; 7.12.0; 7.13.0; 7.14.0; 10.0.0; 10.0.1; 10.1.0; and 10.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2019-3568

Publication date:
14/05/2019
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2019-10919

Publication date:
14/05/2019
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2019-10920

Publication date:
14/05/2019
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2019-10921

Publication date:
14/05/2019
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2019-10924

Publication date:
14/05/2019
A vulnerability has been identified in LOGO! Soft Comfort (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2022

CVE-2019-10916

Publication date:
14/05/2019
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2019-10917

Publication date:
14/05/2019
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2021

CVE-2019-10918

Publication date:
14/05/2019
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2019-11204

Publication date:
14/05/2019
The web interface component of TIBCO Software Inc.'s TIBCO Spotfire Statistics Services contains a vulnerability that might theoretically allow an authenticated user to access sensitive information needed by the Spotfire Statistics Services server. The sensitive information that might be affected includes database, JMX, LDAP, Windows service account, and user credentials. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Statistics Services: versions up to and including 7.11.1; 10.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2019-11205

Publication date:
14/05/2019
The web server component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace, and TIBCO Spotfire Server contains vulnerabilities that theoretically allow reflected cross-site scripting (XSS) attacks. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: 7.14.0; 7.14.1; 10.0.0; 10.0.1; 10.1.0; 10.2.0, and TIBCO Spotfire Server: 7.14.0; 10.0.0; 10.0.1; 10.1.0; 10.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2019

CVE-2019-10922

Publication date:
14/05/2019
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 and newer (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 and newer (All versions). An attacker with network access to affected installations, which are configured without "Encrypted Communication", can execute arbitrary code. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020