Showing 110 advisories
A vulnerability categorized as problematic has been discovered in itsourcecode University Management System 1.0. Affected is an unknown function of the file /add_result.php. Executing a manipulation of the argument vr can lead to cross site scripting. The identification of this vulnerability is CVE-
A vulnerability was found in Portabilis i-Educar 2.11. It has been rated as problematic. This impacts an unknown function of the file /intranet/educar_servidor_curso_lst.php of the component Endpoint. Performing a manipulation of the argument Name results in cross site scripting. This vulnerability
A vulnerability was found in GL-iNet Comet KVM. It has been declared as critical. This affects an unknown function of the component UART. Such manipulation leads to missing authentication. This vulnerability is uniquely identified as CVE-2026-32291. The attack can be executed directly on the physica
A vulnerability was found in ANGEET ES3 KVM. It has been classified as critical. The impacted element is an unknown function. This manipulation causes os command injection. This vulnerability is handled as CVE-2026-32298. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in JetKVM up to 0.5.3 and classified as problematic. The affected element is an unknown function. The manipulation results in improper restriction of excessive authentication attempts. This vulnerability is known as CVE-2026-32295. It is possible to launch the attack remote
A vulnerability has been found in GL-iNet Comet KVM up to 1.7.1 and classified as critical. Impacted is an unknown function. The manipulation leads to improper certificate validation. This vulnerability is traded as CVE-2026-32293. It is possible to initiate the attack remotely. There is no exploit
A vulnerability, which was classified as critical, was found in GL-iNet Comet KVM. This issue affects some unknown processing. Executing a manipulation can lead to insufficient verification of data authenticity. This vulnerability appears as CVE-2026-32290. The attack requires local access. There is
A vulnerability, which was classified as problematic, has been found in JetKVM up to 0.5.3. This vulnerability affects unknown code. Performing a manipulation results in insufficient verification of data authenticity. This vulnerability is reported as CVE-2026-32294. The attack requires a local appr
A vulnerability classified as problematic was found in GL-iNet Comet KVM up to 1.7.1. This affects an unknown part. Such manipulation leads to improper restriction of excessive authentication attempts. This vulnerability is documented as CVE-2026-32292. The attack can be executed remotely. There is
A vulnerability classified as critical has been found in ANGEET ES3 KVM. Affected by this issue is some unknown functionality of the component Configuration File Handler. This manipulation causes missing authentication. This vulnerability is registered as CVE-2026-32297. Remote exploitation of the a
A vulnerability described as critical has been identified in Sipeed NanoKVM up to 2.3.0. Affected by this vulnerability is an unknown functionality of the component Wi-Fi Configuration Endpoint. The manipulation results in missing authentication. This vulnerability is cataloged as CVE-2026-32296. Th
A vulnerability marked as problematic has been reported in Wazuh up to 4.14.2. Affected is an unknown function. The manipulation leads to deserialization. This vulnerability is listed as CVE-2026-25769. The attack may be initiated remotely. There is no available exploit. It is suggested to upgrade t
A vulnerability labeled as critical has been found in Wazuh up to 4.14.2. This impacts an unknown function of the file /var/ossec/etc/ossec.conf. Executing a manipulation can lead to path traversal. This vulnerability is tracked as CVE-2026-25770. The attack can be launched remotely. No exploit exis
A vulnerability identified as critical has been detected in Atlassian Bamboo Data Center up to 9.6.23/10.2.15/12.1.2. This affects an unknown function. Performing a manipulation results in privilege escalation. This vulnerability is identified as CVE-2026-21570. The attack can be initiated remotely.
A vulnerability categorized as problematic has been discovered in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the function sub_420A78 of the file apply_sec.cgi of the component Web Interface. Such manipulation of the argument Language leads to cross site scripting. This vulnerabili
Serial number: AV26-246Date: March 17, 2026 On March 12, 2026, GitHub published security advisories to address vulnerabilities in the following products: GitHub Enterprise Server – versions 3.19.x prior to 3.19.4 GitHub Enterprise Server – versions 3.18.x prior to 3.18.7 GitHub Enterprise Server – v
A vulnerability was found in Duende IdentityServer 4. It has been rated as critical. The affected element is an unknown function of the file /connect/authorize of the component Token Renewal Endpoint. This manipulation of the argument id_token_hint causes improper authentication. The identification
A vulnerability was found in MongoDB Server up to 7.0.30/8.0.19/8.2.5. It has been declared as problematic. Impacted is an unknown function of the component Issuances Handler. The manipulation results in use of uninitialized variable. This vulnerability was named CVE-2026-4147. The attack may be per
A vulnerability was found in MongoDB Server up to 7.0.30/8.0.19/8.2.5. It has been classified as critical. This issue affects some unknown processing. The manipulation of the argument lookup/graphlookup leads to use after free. This vulnerability is uniquely identified as CVE-2026-4148. The attack i
A vulnerability was found in Perle Systems IOLAN STS and IOLAN SCS up to 5.x and classified as critical. This vulnerability affects unknown code of the component ps Command Handler. Executing a manipulation can lead to os command injection. This vulnerability is handled as CVE-2026-23759. The attack
A vulnerability has been found in Outline up to 1.4.x and classified as problematic. This affects an unknown part of the component API Endpoint. Performing a manipulation results in information disclosure. This vulnerability is known as CVE-2026-28506. Remote exploitation of the attack is possible.
Serial number: AV26-245 Date: March 17, 2026 On March 17, 2026, Spring published security advisories to address vulnerabilities in the following product: Spring AI – 1.0.x versions prior to 1.0.4 Spring AI – 1.1.x versions prior to 1.1.3 The Cyber Centre encourages users and administrators to review
View CSAF Summary The SICAM SIAPP SDK contains multiple vulnerabilities that could allow an attacker to disrupt the customer-developed SIAPP or its simulation environment. Potential impacts include denial of service within the SIAPP, corruption of SIAPP data, or exploit the simulation environment. T
View CSAF Summary Schneider Electric is aware of a hard-coded credentials vulnerability in its EcoStruxure IT Data Center Expert (DCE) product that requires administrator credentials and enabling a feature (SOCKS Proxy) that is off by default. The EcoStruxure IT Data Center Expert product is a scala
View CSAF Summary Schneider Electric is aware of a vulnerability in its SCADAPack™ x70 RTU products. The SCADAPack™ 47xi, SCADAPack™ 47x and SCADAPack™ 57x product are Remote Terminal Units that provide communication capabilities for remote monitoring and control. Failure to apply the remediations p
View CSAF Summary 3. TECHNICAL DETAILS The following versions of CODESYS in Festo Automation Suite are affected: FESTO Software Festo Automation Suite (versions prior to 2.8.0.138) installed with CODESYS Software CODESYS Development System (3.0) vers:all/* FESTO Software Festo Automation Suite (vers
A vulnerability was identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger remote code execution, security restriction bypass and data manipulation on the targeted system. Note: CVE-2026-3909 is being exploited in the wild. A... Impact Remote Code Execution Secur
Serial number: AV26-244Date: March 17, 2026 Between March 16 and 17, 2026, HPE published security advisories to address vulnerabilities in the following products: HPE Telco Service Orchestrator – versions prior to v4.2.12 HPE Brocade Fabric OS – versions prior to 9.2.1c3 and 9.2.2c HPE SANnav Manage
Serial number: AV25-391Date: July 3, 2025Updated: March 16, 2026 On May 14, 2025, Wing FTP a published an update to address a critical vulnerability in the following product: Wing FTP Server – version v7.4.3 and prior Open-source reporting has indicated that proof-of-concept exploit code is availabl
Serial number: AV26-243Date: March 16, 2026 On March 13, 2026, Microsoft published a security update to address vulnerabilities in the following product: Microsoft Edge Stable Channel – versions prior to 146.0.3856.59 Microsoft has indicated that CVE-2026-3910 has an available exploit. The Cyber Cen
Serial number: AV26-242Date: March 16, 2026 Between March 9 and 15, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products: Red Hat CodeReady Linux Builder – multiple
Serial number: AV26-241Date: March 16, 2026 Between March 9 and 15, 2026, CISA published ICS advisories to address vulnerabilities in the following products: Apeman Cameras ID71 – all versions Ceragon Siklu MultiHaul and EtherHaul Series – multiple versions Honeywell IQ4x BMS Controller – multiple v
<p><span><span><span><span><span>OpenClaw is a recently fast-growing open-source AI agent platform that emphasises self-hosting, extensibility through skills, and integration with local environments and external services. Official documentation shows that ClawHub is OpenClaw&rsquo;s public skill
Serial number: AV26-240Date: March 16, 2026 On March 13, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 146.0.7680.80 (Windows/Mac) and 146.0.7680.80 (Linux) On March 13, 2026, Cybersecurity and In
Serial number: AV26-239Date: March 16, 2026 Between March 9 and 15, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products: Ubuntu 22.04 LTS Ubuntu 24.04 LTS The Cyber Centre encourages users and administrators to review the web links
Serial number: AV26-238Date: March 16, 2026 Between March 9 and 15, 2026, Dell published security advisories to address vulnerabilities in multiple products: Dell Avamar Data Store Gen5A – versions prior to 2.25.0 and 24.0.0 Dell Connectrix B-Series FOS and SANnav – multiple versions Dell Connectrix
Serial number: AV26-237Date: March 16, 2026 Between March 9 and 15, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following: Cloudera Data Platform Private Cloud Base with IBM (CDP) – version 7.1.9 Cloudera Data Platfo
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-47813 Wing FTP Server Information Disclosure Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses signifi
Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure E
A vulnerability was identified in Microsoft products. A remote attacker could exploit this vulnerability to trigger sensitive information disclosure and data manipulation on the targeted system. Impact Information Disclosure Data Manipulation System / Technologies affected Microsoft Office: Excel (i
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, spoofing and sensitive information disclosure on the targeted system. Note: CVE-2026-.
Solutions HKCERT urges the public to remain vigilant and never enter any information or make payments on suspicious websites. If you receive suspicious SMS messages or emails purporting to be from WSD, do not click on any links and do not provide personal or payment information. If you need to check
Serial number: AV26-235Date: March 13, 2026Updated: March 13, 2026 On March 12, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 146.0.7680.75/76 (Windows/Mac) and 146.0.7680.75 (Linux) Google is awa
Serial number: AV26-236Date: March 13, 2026 On March 11, 2026, ABB published a security advisory to address vulnerabilities in the following products: AWIN GW100 rev.2 – versions 2.0-0 to 2.0-1 AWIN GW120 – versions 1.2-0 to 1.2-1. The Cyber Centre encourages users and administrators to review the p
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3909 Google Skia Out-of-Bounds Write Vulnerability CVE-2026-3910 Google Chromium V8 Unspecified Vulnerability These types of vulnerabilities are frequent at
Multiple vulnerabilities were identified in Cisco IOS XR. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected Cisco IOS XR
Multiple vulnerabilities were identified in Erlang/OTP. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure System / Technologies affected Ver
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, security restriction bypass and data manipulation on the targeted system. Note: CVE-2026-3909 is being exploited in the wild. ... Impact Data Man
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Une vulnérabilité a été découverte dans Python. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Une vulnérabilité a été découverte dans Microsoft Office. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Serial number: AV26-234Date: March 12, 2026 On March 12, 2026, HPE published a security advisory to address a vulnerability in the following product: HPE Compute Scale-up Server 3200 – versions prior to v1.70.74 The Cyber Centre encourages users and administrators to review the provided web links an
Serial number: AV26-233Date: March 12, 2026 On March 11, 2026, Apple published security updates to address vulnerabilities in the following products: iOS – versions prior to 16.7.15 iPadOS – versions prior to 16.7.15 iOS – versions prior to 15.8.7 iPadOS – versions prior to 15.8.7 The Cyber Centre e
Serial number: AV26-232Date: March 12, 2026 On March 12, 2026, ABB published a security advisory to address a vulnerability in the following product: AC500 V3 – firmware version 3.9.0 The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested miti
Serial number: AV26-231Date: March 12, 2026 On March 10, 2026, Zoom published security advisories to address vulnerabilities in the following products: Zoom Meeting SDK for Windows – versions prior to 6.6.11 Zoom Rooms for Windows – versions prior to 6.6.5 Zoom Workplace for Windows – versions prior
Serial number: AV26-230Date: March 12, 2026 On March 10, 2026, GitHub published security advisories to address vulnerabilities in the following products: GitHub Enterprise Server – versions 3.19.x prior to 3.19.3 GitHub Enterprise Server – versions 3.18.x prior to 3.18.6 GitHub Enterprise Server – v
Serial number: AV26-229 Date: March 12, 2026 On March 12, 2026, Veeam published security advisories to address critical vulnerabilities in the following products: Veeam Backup & Replication – 12 versions prior to 12.3.2.4165 Veeam Backup & Replication – 13 versions prior to 13.0.1.2067 The Cyber Cen
Serial number: AV26-228Date: March 12, 2026 On March 11, 2026, Palo Alto Networks published security advisories to address vulnerabilities in the following products: Cortex XDR Broker VM 30.0.0 – versions prior to 30.0.49 Cortex XDR Agent 8.7-CE – versions prior to 8.7.101-CE on macOS Cortex XDR Age
Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, cross-site scripting, data manipulation, information disclosure and security restriction bypass on the targeted system. Impact Denial of Service S
View CSAF Summary SIDIS Prime before V4.0.800 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, and several Node.js packages as described below. Siemens has released a new version of SIDIS Prime and recommends to update to the latest version. The following versions of Siemen
View CSAF Summary Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products. Siemens has released a new version for RUGGEDCOM APE1808 and recommends to update to the latest version. The following versions of Siemens RUGGEDCOM APE180
View CSAF Summary SIMATIC S7-1500 devices contain a vulnerability that could allow an attacker to inject code by tricking a legitimate user into importing a specially crafted trace file in the web interface. Siemens has released new versions for several affected products and recommends to update to
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information, execute arbitrary commands, or perform a denial-of-service on the product. The following versions of Trane Tracer SC, Tracer SC+, and Tracer Concierge are affected: Tracer SC
View CSAF Summary Heliox EV Chargers listed below contain improper access control vulnerability that could allow an attacker to reach unauthorized services via the charging cable. Siemens has released new versions for the affected products and recommends to update to the latest versions. The followi
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to execute malicious code with OS application service account permissions that the authenticated, privileged application user did not intend on running. The following versions of Inductive Automation Ignition Sof
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure and security restriction bypass on the targeted system. Impact Security Restriction Bypass Information Discl
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, spoofing and sensitive information disclosure on the targeted system. Impact Informatio
Multiple vulnerabilities were identified in Mozilla Firefox. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass and remote code execution on the targeted system. Impact Remote Code Execution Security Restriction Bypass System / Technologies affected
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Une vulnérabilité a été découverte dans GLPI. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Cisco IOS XR. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service à distance. L'éditeur fournit des recommandations dans l'attente de la publication de nouvelles versions applicatives.
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Veeam Backup & Replication. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans GitLab. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Une vulnérabilité a été découverte dans Microsoft Edge. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber acto
Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger security restriction bypass and remote code execution on the targeted system. Impact Remote Code Execution Security Restriction Bypass System / Technologies affected AOS-CX 10
Adobe has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes Details (including CVE) Adobe Commerce Medium Risk Cross-site Scripting Elevation of Privilege Security Restriction Bypass Remote Code Execution Information Disclosure... Impact Remote Code Exe
Microsoft has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes SQL Server Medium Risk Elevation of Privilege Azure Medium Risk Elevation of Privilege Information Disclosure Spoofing Windows Medium Risk Elevation... Impact Remote Code Execution Denial o
Multiple vulnerabilities were identified in Zoom Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege on the targeted system. Impact Elevation of Privilege System / Technologies affected Zoom Meeting SDK for Windows before version 6.6.11 in the 6.
De multiples vulnérabilités ont été découvertes dans Microsoft .Net. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
View CSAF Summary Successful exploitation of this vulnerability could allow an unauthorized attacker to access controller management settings, control components, disclose information, or cause a denial-of-service condition. The following versions of Honeywell IQ4x BMS Controller are affected: IQ4E
View CSAF Summary Successful exploitation of this vulnerability could result in arbitrary file upload to the target equipment. The following versions of Ceragon Siklu MultiHaul and EtherHaul Series are affected: MultiHaul MH-B100-CCS MultiHaul MH-T200-CCC MultiHaul MH-T200-CNN MultiHaul MH-T201-CNN
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to take control of the device or view camera feeds. The following versions of Apeman Cameras are affected: ID71 vers:all/* (CVE-2025-11126, CVE-2025-11851, CVE-2025-11852) CVSS Vendor Equipment Vulnerabilities
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication and execute code with root-level privileges. The following versions of Lantronix EDS3000PS and EDS5000 are affected: EDS3000PS 3.1.0.0R2 (CVE-2025-67039, CVE-2025-70082, CVE-2025-67041
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-22054 Omnissa Workspace ONE Server-Side Request Forgery CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability CVE-2026-1
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system. Impact
A vulnerability has been identified in pac4j-jwt. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: Proof of Concept exploit code Is publicly available for CVE-2026-29000. Attackers who possess the server'... Impact Security
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system. Impact I
View CSAF Summary Successful exploitation of this vulnerability could result in an attacker achieving remote code execution on the device. The following versions of Delta Electronics CNCSoft-G2 are affected: CNCSoft-G2 CVSS Vendor Equipment Vulnerabilities v3 7.8 Delta Electronics Delta Electronics
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnera
Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans les produits Mattermost. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is
On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited numbe
On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remedia
On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affec
On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulne
On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet b
On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the Arcane
On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild. It is recommended updating as soon as possib