Showing 90 advisories
Serial number: AV26-060Date: January 28, 2026 On January 27, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 144.0.7559.109/.110 (Windows/Mac) and 144.0.7559.109 (Linux) The Cyber Centre encourages
Serial number: AV26-059Date: January 27, 2026Updated: January 28, 2026 On January 27, 2026, Fortinet published a security advisory to address a critical vulnerability in the following products: FortiAnalyzer 7.6 – versions 7.6.0 to 7.6.5 FortiAnalyzer 7.4 – versions 7.4.0 to 7.4.9 FortiAnalyzer 7.2
Multiple vulnerabilities were identified in Aruba Product. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, sensitive information disclosure, data manipulation and remote code execution on the targeted system. Impact Remote Code Execution Data Manipulatio
A vulnerability has been identified in Fortinet Products. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: CVE-2026-24858 is being exploited in the wild. An Authentication Bypass Using an Alternate Path or Channel... Impact Secur
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected Google Chrome prior to 144.0.7559
Multiple vulnerabilities were identified in TP-Link Router. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected TL-WR841N v
Serial number: AV26-058Date: January 27, 2026 On January 27, 2026, OpenSSL published security advisories to address vulnerabilities in multiple products. Included were updates for the following products: OpenSSL – versions 3.6.0 to versions prior to 3.6.1 OpenSSL – versions 3.5.0 to versions prior t
Serial number: AV26-024Date: January 13, 2026Updated: January 27, 2026 On January 13, 2026, Microsoft published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following products: Azure Connected Machine Agent Azure Core shared client libra
Serial number: AV25-866Date: December 30, 2025Updated: January 27, 2026 On October 9, 2025, SmarterTools published a security update to address a critical vulnerability in the following product: SmarterMail – version Build 9406 and prior Users and administrators of affected product versions are advi
Serial number: AV26-047Date: January 21, 2026Updated: January 26, 2026 On January 21, 2026, GNU published a security advisory to address a vulnerability in the following product. Included was a critical update for the following: GNU InetUtils – versions 1.9.3 to 2.7 Update 1 On January 26, 2026, Cyb
View CSAF Summary Successful exploitation of this vulnerability could result in remote SQL execution, leading to alteration or loss of data. The following versions of Johnson Controls Products are affected: Application and Data Server (ADS) (CVE-2025-26385) Extended Application and Data Server (ADX)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-24858 Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability This type of vulnerability is a frequent attack vector
View CSAF Summary MES PCs shipped with Windows 10 come pre-installed with XAMPP. XAMPP is a bundle of third-party open-source applications including the Apache HTTP Server, the MariaDB database and more. From time to time, vulnerabilities in these applications are discovered. These are fixed in newe
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to perform unauthorized actions on the file system. The following versions of iba Systems ibaPDA are affected: ibaPDA (CVE-2025-14988) CVSS Vendor Equipment Vulnerabilities v3 9.8 iba Systems iba Systems ibaPDA I
View CSAF Summary Schneider Electric is aware of multiple vulnerabilities with EmberZNet disclosed by Silicon Labs. Many vendors, including Schneider Electric, use Silicon Labs’ Zigbee processors in their offers. The following have denial of service vulnerabilities: Wiser iTRV, Wiser RTR, Wiser UFH,
A vulnerability was identified in Microsoft Office. An attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: CVE-2026-21509 is being exploited in the wild. Reliance on untrusted inputs in a security decision in Microsoft Office... Impact Secur
Serial number: AV26-057Date: January 26, 2026 On January 23, 2026, Microsoft published a security update to address vulnerabilities in the following product: Microsoft Edge Stable Channel – versions prior to 144.0.3719.92 The Cyber Centre encourages users and administrators to review the provided we
Serial number: AV26-056Date: January 26, 2026 On January 19, 2026, B&R published ICS advisories to address vulnerabilities in the following products: Automation Runtime 6 versions – versions prior to 6.5 Automation Runtime 4 versions – versions prior to R4.93 Automation Studio – versions prior to 6.
Serial number: AV26-055Date: January 26, 2026 On January 23, 2026, ABB published a security advisory to address a vulnerability in the following products: ABB 800xA Base – version 6.0.3-9 and prior ABB 800xA Base – version 6.1.1-2 and prior The Cyber Centre encourages users and administrators to rev
Serial number: AV26-054Date: January 26, 2026 Between January 19 and 25, 2026, VMware published security advisories to address vulnerabilities in multiple Tanzu products. AI Services for VMware Tanzu Platform – versions prior to 10.3.3 Elastic Application Runtime for VMware Tanzu Platform – versions
Serial number: AV26-053Date: January 26, 2026 Between January 19 and 25, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products: Red Hat CodeReady Linux Builder – mul
Serial number: AV26-052Date: January 26, 2026 On January 23, 2026, HPE published a security advisory to address vulnerabilities in the following product: HPE Telco Universal SLA Management – version 4.6 and prior The Cyber Centre encourages users and administrators to review the provided web links a
Serial number: AV26–051Date: January 26, 2026 Between January 19 and 25, 2026, CISA published ICS advisories to address vulnerabilities in the following products: AutomationDirect CLICK Programmable Logic Controller – version C0-0x AutomationDirect CLICK Programmable Logic Controller – version C0-1x
Number: AL25-019Date: December 15, 2025Updated: January 26, 2026 Audience This Alert is intended for IT professionals and managers. Purpose An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and miti
Serial number: AV26-050Date: January 26, 2026 Between January 19 and 25, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following: IBM Big SQL on IBM Cloud Pak for Data – multiple versions IBM Concert Software – version
A vulnerability was identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system. Impact Denial of Service System / Technologies affected Microsoft Edge version prior to 144.0.3719.92 Solutions Before installation of t
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2018-14634 Linux Kernel Integer Overflow Vulnerability CVE-2025-52691 SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability CVE
Multiple vulnerabilities were identified in VMware products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege and remote code execution on the targeted system. Note: CVE-2024-37079 is actively exploited in the wild. A malicious actor with... Impact Remo
Serial number: AV26-042Date: January 21, 2026Updated: January 23, 2026 On January 20, 2026, Oracle published a security advisory to address vulnerabilities in multiple products. Update 1 On January 21, 2026, a proof of concept (PoC) for the vulnerability CVE-2026-21962 became publicly available. CVE
Executive Summary In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144,” the Cybersecurity and Infrastructure Security Agency (CISA) is providing and regularly upd
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and p
Serial number: AV26-049Date: January 22, 2026 On January 21, 2026, ISC published a security advisory to address a vulnerability in the following products: ISC BIND 9 – versions 9.18.40 to 9.18.43 ISC BIND 9 – versions 9.20.13 to 9.20.17 ISC BIND 9 – versions 9.21.12 to 9.21.16 BIND Supported Preview
Number: AL26-002Date: January 22, 2026 Audience This Alert is intended for IT professionals and managers. Purpose An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipient
View CSAF Summary Successful exploitation of this vulnerability could enable an attacker to execute arbitrary code. The following versions of Delta Electronics DIAView are affected: DIAView (CVE-2026-0975) CVSS Vendor Equipment Vulnerabilities v3 7.8 Delta Electronics Delta Electronics DIAView Impro
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a failure within the operating system of the machine hosting the ICU tool. The following versions of Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool are affected: iSTAR Configuration Utility
View CSAF Summary Successful exploitation of these vulnerabilities could allow a low-level user to alter privileges and gain full control to the device. The following versions of Weintek cMT X Series HMI EasyWeb Service are affected: cMT3072XH (CVE-2025-14750, CVE-2025-14751) cMT3072XH(T) (CVE-2025-
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-31125 Vite Vitejs Improper Access Control Vulnerability CVE-2025-34026 Versa Concerto Improper Authentication Vulnerability CVE-2025-54313 Prettier eslint-
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition. The following versions of Rockwell Automation CompactLogix 5370 are affected: CompactLogix 5370 (CVE-2025-11743) CompactLogix 5370 (CVE-2025-11743) CompactLogix 5370 (CVE-2
View CSAF Summary Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses. The following versions of EVMAPA are affected: EVMAPA (CVE-20
View CSAF Summary Successful exploitation of this vulnerability could allow an authenticated attacker to escalate their privileges and control devices outside of their authorized scope. The following versions of Hubitat Elevation Hubs are affected: Elevation C3 (CVE-2026-1201) Elevation C4 (CVE-2026
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to impersonate users, escalate privileges, gain unauthorized access to systems and services, and decrypt sensitive data. The following versions of AutomationDirect CLICK Programmable Logic Controller are affec
View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxureTM Process and EcoStruxure™ Process Expert for AVEVA System Platform products. The EcoStruxureTM Process is a single automation system to engineer, operate, and maintain your entire infrastructure for a sustainable, p
Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, cross-site scripting, remote code execution and elevation of privilege on the targeted system. Note: CVE-2026-20045 is... Impact Denial of
Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and security restriction bypass on the targeted system. Impact Denial of Service Security Restriction Bypass System / Technologies affected GitLab
**Objet** : Recommandations de sécurisation des systèmes d’information à destination des producteurs, des intégrateurs et des installateurs des systèmes de production industriels du secteur de l’énergie et de l’eau en France. **Annexe** : Liens et références Depuis plusieurs mois, l’Agence...
Une vulnérabilité a été découverte dans les produits Cisco. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance. Cisco indique que la vulnérabilité CVE-2026-20045 est activement exploitée.
Une vulnérabilité a été découverte dans Ceph. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Une vulnérabilité a été découverte dans Python. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans les produits Symantec. Elles permettent à un attaquant de provoquer une élévation de privilèges et un contournement de la politique de sécurité.
Serial number: AV26-048Date: January 22, 2026 On January 21, 2026, Cisco published a security advisory to address a critical vulnerability in the following products: Cisco Unified CM – versions prior to 12.5, 14 and 15 Unified CM IM&P – versions prior to 12.5, 14 and 15 Unified CM SME – versions pri
Serial number: AV26-046Date: January 22, 2026 Between January 20 and 21, 2026, HPE published security advisories to address vulnerabilities in the following products: HPE Alletra 6000 – versions prior to 6.1.2.800, version 6.1.3 versions prior to 6.1.3.300 HPE Nimble Storage Hybrid Flash Arrays – ve
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and
A vulnerability was identified in Zoom Products. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Impact Remote Code Execution System / Technologies affected Zoom Node Meetings Hybrid (ZMH) MMR module versions prior to 5.2.1716.0 Zoom Node M
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system. Impact Denial of Service System / Technologies affected Google Chrome prior to 144.0.7559.96 (Linux) Google Chrome prior to 144.0.7559.96
Multiple vulnerabilities were identified in Oracle Products, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, denial of service condition, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the
Le 20 janvier 2026, les détails de la vulnérabilité CVE-2026-24061, affectant *telnetd*, ont été publiés. Cette vulnérabilité permet à un attaquant de contourner l'authentification et de se connecter à une machine vulnérable en tant que l'utilisateur *root*. Elle a été introduite en mars 2015 et...
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans CPython. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans Oracle Database Server. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans Oracle Weblogic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Une vulnérabilité a été découverte dans Google Chrome. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans GitLab. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un déni de service.
View CSAF Summary Schneider Electric is aware of a vulnerability disclosed by INTEL used in the EcoStruxure™ Foxboro DCS product formerly known as Foxboro Evo Process Automation System and I/A Series. The [EcoStruxure™ Foxboro DCS product](https://www.se.com/ww/en/product-range/63680-ecostruxure-fox
View CSAF Summary Successful exploitation of these vulnerabilities may allow an attacker to access sensitive information stored in variables within the ADI server. The following versions of Rockwell Automation Verve Asset Manager are affected: Verve Asset Manager (CVE-2025-14376, CVE-2025-14377) Ver
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and security restriction bypass on the targeted system. Impact Remote Code Execution Denial of Service Security Rest
Une vulnérabilité a été découverte dans les produits Microsoft. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, sensitive information disclosure, elevation of privilege and security restriction bypass on the targeted system.
Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, security restriction bypass, data manipulation and remote code execution on the targeted system. Impact Remote Code Execution Data Manipulation Se
Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, spoofing, security restriction bypass, remote code execution and sensitive information disclosure on the targeted system. [Updated on 20
A vulnerability was identified in Palo Alto PAN-OS. A remote attacker can exploit this vulnerability to trigger denial of service condition on the targeted system. Note: Proof of Concept exploit code Is publicly available for CVE-2026-0227. The vulnerability in... Impact Denial of Service System / T
Adobe has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes Details (including CVE) Adobe Dreamweaver Medium Risk Remote Code Execution Data Manipulation APSB26-01 Adobe InDesign Medium Risk Remote Code... Impact Remote Code Execution Information Disclo
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution on the targeted system. Impact Remote Code Execution System / Technologies affected FortiClientEMS FortiClientEMS 7.0 all versions FortiClient
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and security restriction bypass on the targeted system. Impact Remote Code Execution Denial of Service Security Restr
De multiples vulnérabilités ont été découvertes dans Synacor Zimbra Collaboration. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et une injection de requêtes illégitimes par rebond...
De multiples vulnérabilités ont été découvertes dans les produits Mitel. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.
On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remedia
On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affec
On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulne
On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet b
On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the Arcane
On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild. It is recommended updating as soon as possib
On September 17, 2025, SolarWinds released a security advisory addressing a critical vulnerability in its Web Help Desk product. The fix provided as part of this advisory is a patch bypass of CVE-24-28988, which in turn is a patch bypass of CVE-2024-28986. It is recommended updating affected assets
On 26 August 2025, Citrix released a security advisory addressing one critical and two high severity vulnerabilities in NetScaler ADC and NetScaler Gateway. Citrix warns that exploits of the critical vulnerability, CVE-2025-7775, have been observed on unmitigated appliances. It is recommended to upd