<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2026-0485 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2026-0485/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Thu, 16 Apr 2026 13:35:33 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2026-0485</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2026-0485/#post-20021</link>
                        <pubDate>Wed, 18 Feb 2026 16:13:59 +0000</pubDate>
                        <description><![CDATA[Description
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatic...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.</p>
<h3>References<span> </span></h3>
<p><a class="external" href="https://me.sap.com/notes/3678282" target="_blank" rel="noopener noreferrer">https://me.sap.com/notes/3678282</a></p>
<p><a class="external" href="https://url.sap/sapsecuritypatchday" target="_blank" rel="noopener noreferrer">https://url.sap/sapsecuritypatchday</a></p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2026-0485/#post-20021</guid>
                    </item>
							        </channel>
        </rss>
		