Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8068

Publication date:
12/11/2024
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2024-8069

Publication date:
12/11/2024
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2024-49051

Publication date:
12/11/2024
Microsoft PC Manager Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2024

CVE-2024-49056

Publication date:
12/11/2024
Authentication bypass by assumed-immutable data on airlift.microsoft.com allows an authorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2024-51720

Publication date:
12/11/2024
An insufficient entropy vulnerability in the SecuSUITE Secure Client Authentication (SCA) Server of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially enroll an attacker-controlled device to the victim’s account and telephone number.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-49046

Publication date:
12/11/2024
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2024

CVE-2024-49048

Publication date:
12/11/2024
TorchGeo Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2024

CVE-2024-49049

Publication date:
12/11/2024
Visual Studio Code Remote Extension Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2024

CVE-2024-49050

Publication date:
12/11/2024
Visual Studio Code Python Extension Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2025

CVE-2024-49039

Publication date:
12/11/2024
Windows Task Scheduler Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2024-49040

Publication date:
12/11/2024
Microsoft Exchange Server Spoofing Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2024

CVE-2024-49043

Publication date:
12/11/2024
Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2024