Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-0508

Publication date:
10/02/2026
The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high privileges to insert malicious URL within the application. Upon successful exploitation, the victim may click on this malicious URL, resulting in an unvalidated redirect to the attacker-controlled domain and subsequently download the malicious content. This vulnerability has a high impact on the confidentiality and integrity of the application, with no effect on the availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0505

Publication date:
10/02/2026
The BSP applications allow an unauthenticated user to manipulate user-controlled URL parameters that are not sufficiently validated. This could result in unvalidated redirection to attacker-controlled websites, leading to a low impact on confidentiality and integrity, and no impact on the availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0490

Publication date:
10/02/2026
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0488

Publication date:
10/02/2026
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0486

Publication date:
10/02/2026
In ABAP based SAP systems a remote enabled function module does not perform necessary authorization checks for an authenticated user resulting in disclosure of system information.This has low impact on confidentiality. Integrity and availability are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0485

Publication date:
10/02/2026
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-0484

Publication date:
10/02/2026
Due to missing authorization check in SAP NetWeaver Application Server ABAP and SAP S/4HANA, an authenticated attacker could access a specific transaction code and modify the text data in the system. This vulnerability has a high impact on integrity of the application with no effect on the confidentiality and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-2258

Publication date:
10/02/2026
A flaw has been found in aardappel lobster up to 2025.4. Affected by this vulnerability is the function WaveFunctionCollapse in the library dev/src/lobster/wfc.h. Executing a manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been published and may be used. This patch is called c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd. It is advisable to implement a patch to correct this issue.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2025-15314

Publication date:
10/02/2026
Tanium addressed an arbitrary file deletion vulnerability in end-user-cx.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2025-15310

Publication date:
10/02/2026
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2025-15313

Publication date:
10/02/2026
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2026-0845

Publication date:
10/02/2026
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'WCFM_Settings_Controller::processing' function in all versions up to, and including, 6.7.24. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026