Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-0485

Publication date:
10/02/2026
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-0486

Publication date:
10/02/2026
In ABAP based SAP systems a remote enabled function module does not perform necessary authorization checks for an authenticated user resulting in disclosure of system information.This has low impact on confidentiality. Integrity and availability are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-0488

Publication date:
10/02/2026
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-0490

Publication date:
10/02/2026
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-0484

Publication date:
10/02/2026
Due to missing authorization check in SAP NetWeaver Application Server ABAP and SAP S/4HANA, an authenticated attacker could access a specific transaction code and modify the text data in the system. This vulnerability has a high impact on integrity of the application with no effect on the confidentiality and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-2258

Publication date:
10/02/2026
A flaw has been found in aardappel lobster up to 2025.4. Affected by this vulnerability is the function WaveFunctionCollapse in the library dev/src/lobster/wfc.h. Executing a manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been published and may be used. This patch is called c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd. It is advisable to implement a patch to correct this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
10/02/2026

CVE-2025-15310

Publication date:
10/02/2026
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2025-15313

Publication date:
10/02/2026
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2025-15314

Publication date:
10/02/2026
Tanium addressed an arbitrary file deletion vulnerability in end-user-cx.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-0845

Publication date:
10/02/2026
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'WCFM_Settings_Controller::processing' function in all versions up to, and including, 6.7.24. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2025-15147

Publication date:
10/02/2026
The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.11.8 via the 'WCFMvm_Memberships_Payment_Controller::processing' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify other users' membership payments.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026

CVE-2026-25957

Publication date:
09/02/2026
Cube is a semantic layer for building data applications. From 1.1.17 to before 1.5.13 and 1.4.2, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. This vulnerability is fixed in 1.5.13 and 1.4.2.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2026