Showing 110 advisories
A vulnerability categorized as critical has been discovered in The Plus Addons for Elementor Plugin up to 6.4.7 on WordPress. The affected element is an unknown function of the component AJAX Handler. Executing a manipulation of the argument email_data can lead to Remote Code Execution. This vulnera
A vulnerability was found in Dromara UJCMS 10.0.2. It has been rated as critical. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. T
A vulnerability was found in Dromara UJCMS 101.2. It has been declared as critical. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. This vulnerability is listed as CVE-2026-2953
A vulnerability was found in Vaelsys 4.1.0. It has been classified as critical. This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler. This manipulation of the argument xajaxargs causes os command injection. This vulnerability is tracked
A vulnerability was found in rymcu forest up to 0.0.5 and classified as problematic. This affects the function updateUserInfo of the file - src/main/java/com/rymcu/forest/web/api/user/UserInfoController.java of the component User Profile Handler. The manipulation results in cross site scripting. Thi
A vulnerability has been found in rymcu forest up to 0.0.5 and classified as problematic. Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio. The manipulation leads to cross
A vulnerability, which was classified as critical, was found in JeecgBoot 3.9.0. Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The identification of this vu
A vulnerability, which was classified as critical, has been found in Tosei Online Store Management System ネット店舗管理システム 1.01. Affected is the function system of the file /cgi-bin/monitor.php of the component HTTP POST Request Handler. Performing a manipulation of the argument DevId results in os comma
A vulnerability classified as problematic was found in SapneshNaik Student Management System up to f4b4f0928f0b5551a28ee81ae7e7fe47d9345318. This impacts an unknown function of the file index.php. Such manipulation of the argument Error leads to cross site scripting. This vulnerability is uniquely i
A vulnerability classified as critical has been found in Zaher1307 tiny_web_server up to 8d77b1044a0ca3a5297d8726ac8aa2cf944d481b. This affects the function tiny_web_server/tiny.c of the file tiny_web_server/tiny.c of the component URL Handler. This manipulation causes out-of-bounds write. This vuln
A vulnerability described as problematic has been identified in itsourcecode Student Management System 1.0. The impacted element is an unknown function of the file /add_student/ of the component Add Student Module. The manipulation results in cross site scripting. This vulnerability is known as CVE-
A vulnerability marked as critical has been reported in SourceCodester Student Result Management System 1.0. The affected element is an unknown function of the file /srms/script/admin/core/update_smtp.php. The manipulation leads to improper access controls. This vulnerability is traded as CVE-2026-2
A vulnerability labeled as problematic has been found in OpenClaw up to 2026.2.18. Impacted is an unknown function of the component ACP Bridge. Executing a manipulation can lead to resource consumption. This vulnerability appears as CVE-2026-27576. The attack requires local access. There is no avail
A vulnerability identified as critical has been detected in ellite Wallos up to 4.6.0. This issue affects the function getLogoFromUrl. Performing a manipulation results in server-side request forgery. This vulnerability is reported as CVE-2026-27479. The attack is possible to be carried out remotely
A vulnerability categorized as critical has been discovered in oneuptime up to 10.0.4. This vulnerability affects unknown code. Such manipulation leads to code injection. This vulnerability is documented as CVE-2026-27574. The attack can be executed remotely. There is not any exploit available. It i
A vulnerability was found in lettermint lettermint-node up to 1.5.0. It has been rated as problematic. This affects the function send of the component Password Reset Handler. This manipulation causes exposure of data element to wrong session. This vulnerability is registered as CVE-2026-27492. The a
A vulnerability was found in OpenClaw up to 2026.2.13 on macOS. It has been declared as critical. Affected by this issue is some unknown functionality of the component Claude CLI Keychain Credential Refresh Path Handler. The manipulation results in os command injection. This vulnerability is catalog
A vulnerability was found in OpenClaw up to 2026.2.13. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component CLI. The manipulation leads to unverified ownership. This vulnerability is listed as CVE-2026-27486. The attack must be carried ou
A vulnerability was found in OpenClaw up to 2026.2.18 and classified as critical. Affected is the function fetch of the file src/gateway/server-cron.ts. Executing a manipulation can lead to server-side request forgery. This vulnerability is tracked as CVE-2026-27488. The attack can be launched remot
A vulnerability has been found in ray-project ray up to 2.53.x and classified as problematic. This impacts an unknown function of the component DELETE Endpoint. Performing a manipulation results in declaration of catch for generic exception. This vulnerability is identified as CVE-2026-27482. The at
Serial number: AV25-309Date: June 2, 2025Updated: February 20, 2026 On June 1, 2025, Roundcube published security advisories to address vulnerabilities in the following products: Webmail – versions prior to 1.5.10 Webmail – versions prior to 1.6.11 Update 1 On February 20, 2026, Cybersecurity and In
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization of Untrusted Data Vulnerability CVE-2025-68461 RoundCube Webmail Cross-site Scripting Vulnerability These types of v
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition and sensitive information disclosure on the targeted system. Impact Remote Code Execution Information Disclosure Deni
A vulnerability has been identified in Apache Tomcat. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Impact Security Restriction Bypass System / Technologies affected Apache Tomcat version 9.0.83 to 9.0.114 Apache Tomcat version 10.1
A vulnerability was identified in F5 BIG-IP. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system. Impact Denial of Service System / Technologies affected BIG-IP AFM and DDoS Hybrid Defender 17.5.1.4 Solutions Before installation of the sof
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial of service condition, security restriction bypass and remote code execution on the targeted system. Note: CVE-2026-2441 is bei
A vulnerability was identified in Mozilla Products. A remote attacker could exploit this vulnerability to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected Versions prior to: Firefox 147
Serial number: AV26-150Date: February 19, 2026 On February 19, 2026, HPE published security advisories to address vulnerabilities in the following products: HPE Telco Service Activator – versions prior to 10.5.0 HPE SimpliVity 380 servers – versions prior to SimpliVity Support Pack (SVTSP) Gen10 and
Serial number: AV26-149Date: February 19, 2026 On February 18, 2026, Tenable published a security advisory to address vulnerabilities in the following product. Included was a critical update for the following: Tenable Security Center – version 6.7.2 w/ Patch SC-202602.1 and Patch SC-202602.2 and pri
Serial number: AV26-148Date: February 19, 2026 On February 19, 2026, IceWarp published security advisories to address vulnerabilities in multiple products. Included was a critical vulnerability affecting the following products: IceWarp Epos Update 2 – versions prior to 14.2.0.12 IceWarp Epos Update
Serial number: AV26-147Date: February 19, 2026 On February 18, 2026, Splunk published security advisories to address vulnerabilities in the following products: Splunk Enterprise – multiple versions Splunk Cloud Platform – multiple versions Splunk Universal Forwarder – multiple versions Splunk DB Con
Serial number: AV26-146Date: February 19, 2026 On February 10, 2026, GitHub published security advisories to address vulnerabilities in the following products: GitHub Enterprise Server – versions 3.19.x prior to 3.19.2 GitHub Enterprise Server – versions 3.18.x prior to 3.18.5 GitHub Enterprise Serv
Serial number: AV26-145Date: February 19, 2026 On February 18, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 145.0.7632.109/110 (Windows/Mac) and 144.0.7559.109 (Linux) The Cyber Centre encourages
View CSAF Summary Successful exploitation of this vulnerability could allow an unauthenticated attacker to manipulate the web maintenance services URL to achieve arbitrary file read access. The following versions of Valmet DNA Engineering Web Tools are affected: Valmet DNA Engineering Web Tools <=C2
View CSAF Summary Successful exploitation of these vulnerabilities could result in authentication being disabled, a denial-of-service condition, or an attacker stealing valid user credentials, including administrator credentials. The following versions of Jinan USR IOT Technology Limited (PUSR) USR-
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely execute arbitrary code and bypass ASLR. The following versions of EnOcean SmartServer IoT are affected: SmartServer IoT <=4.60.009 (CVE-2026-20761, CVE-2026-22885) CVSS Vendor Equipment Vulnerabili
View CSAF Summary Successful exploitation of this vulnerability could result in an over- or under-odorization event. The following versions of Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller are affected: OdorEyes EcoSystem Pulse Bypass System with XL4 Controller vers:all/* (CVE-20
Serial number: AV26-144Date: February 18, 2026 On February 18, 2026, F5 published a security advisory to address a vulnerability in the following product: BIG-IP AFM and DDoS Hybrid Defender 17.x – version 17.5.1.4 The Cyber Centre encourages users and administrators to review the provided web link
Serial number: AV26-138Date: February 18, 2026Updated: February 18, 2026 On February 17, 2026, Dell published security advisories to address vulnerabilities in multiple products. Included was a critical update for the following: RecoverPoint for Virtual Machines – versions prior to 5.3 SP4 P1 Recove
Serial number: AV26-143Date: February 18, 2026 On February 14, 2026, Microsoft published a security update to address vulnerabilities in the following product: Microsoft Edge Stable Channel – versions prior to 145.0.3800.58 Microsoft has indicated that CVE-2026-2441 has an available exploit. The Cyb
Serial number: AV26-142Date: February 18, 2026 On February 18, 2026, Jenkins published a security advisory to address vulnerabilities in the following products: Jenkins weekly – version 2.550 and prior Jenkins LTS – versions 2.541.1 and prior The Cyber Centre encourages users and administrators to r
Serial number: AV26-141Date: February 18, 2026 On February 17, 2026, Atlassian published a security advisory to address vulnerabilities in the following products: Bamboo Data Center and Server – multiple versions Confluence Data Center and Server – multiple versions Crowd Data Center and Server – mu
Serial number: AV26-140 Date: February 18, 2026 On February 18, 2026, ABB published a security advisory to address vulnerabilities in the following product: B&R Automation Studio – versions prior to 6.5 The Cyber Centre encourages users and administrators to review the provided web links and perform
Serial number: AV26-139Date: February 18, 2026 On February 17, 2026, HPE published a security advisory to address a vulnerability in the following product: HPE Aruba Networking ClearPass Policy Manager 6.12.x – version 6.12.7 and prior HPE Aruba Networking ClearPass Policy Manager 6.11.x – version 6
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-22175 GitLab Server-Side Request Forgery (SSRF) Vulnerability CVE-2026-22769 Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials V
Serial number: AV26-130Date: February 16, 2026Updated: February 17, 2026 On February 13, 2026, Google published a security advisory to address a vulnerability in the following product: Stable Channel Chrome for Desktop – versions prior to 145.0.7632.75/76 (Windows/Mac) and 144.0.7559.75 (Linux) Goog
Serial number: AV26-137Date: February 17, 2026 On February 17, 2026, Tenable published a security advisory to address vulnerabilities in the following product. Included was a critical update for the following: Tenable Security Center – version 6.7.2 and prior The Cyber Centre encourages users and ad
Serial number: AV26-136Date: February 17, 2026 On February 16, 2026, Mozilla published security advisories to address vulnerabilities in the following products: Thunderbird – versions prior to 147.0.2 and 140.7.2 Firefox – versions prior to 147.0.4 Firefox ESR – versions prior to 115.32.1 Firefox ES
Serial number: AV26-135Date: February 17, 2026 Between February 9 and 15, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products: Red Hat CodeReady Linux Builder – mu
Serial number: AV26-134Date: February 17, 2026 Between February 9 and 15, 2026, CISA published ICS advisories to address vulnerabilities in the following products: AVEVA PI Data Archive PI Server – multiple versions AVEVA PI to CONNECT Agent – versions prior to v2.4.2520 Airleader GmbH Airleader Mas
Serial number: AV26-133Date: February 17, 2026 Between February 9 and 15, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products: Ubuntu 16.04 LTS Ubuntu 18.04 LTS Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS Ubuntu 25.10 The Cyb
View CSAF Summary Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading to further network compromise. The following versions of Honeywell CCTV Prod
View CSAF Summary Successful exploitation of these vulnerabilities may allow code execution with elevated privileges. The following versions of GE Vernova Enervista UR Setup are affected: Enervista UR Setup <8.70 (CVE-2026-1762, CVE-2026-1763) CVSS Vendor Equipment Vulnerabilities v3 7.8 GE Vernova
View CSAF Summary Successful exploitation of this vulnerability may allow an attacker to write arbitrary data beyond the bounds of a stack-allocated buffer, leading to the corruption of a structured exception handler (SEH). The following versions of Delta Electronics ASDA-Soft are affected: ASDA-Sof
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2008-0015 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability CVE-2020-7796 Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request
View CSAF Summary Siemens Simcenter Femap and Nastran is affected by multiple file parsing vulnerabilities that could be triggered when the application reads files in NDB and XDB formats. If a user is tricked to open a malicious file with any of the affected products, this could lead the application
Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans LibreNMS. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et une injection de code indirecte à distance (XSS).
De multiples vulnérabilités ont été découvertes dans Moodle. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service.
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Note: CVE-2026-2441 is being exploited in the wild. A remote attacker could exploit this vulnerability to execute arbitrary... Impact Remote Co
Multiple vulnerabilities were identified in PostgreSQL. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. Impact Remote Code Execution Information Disclosure Elevation of
Ce bulletin d'actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas l'analyse de l'ensemble des avis et alertes publiés par le CERT-FR dans le cadre d'une analyse de risques pour prioriser l'application des...
De multiples vulnérabilités ont été découvertes dans les produits Mattermost. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Une vulnérabilité a été découverte dans Google Chrome. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Google indique que la vulnérabilité CVE-2026-2441 est activement exploitée.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-1731 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability These types of vulnerabilities are frequent attack
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, elevation of privilege, sensitive information disclosure, data manipulation and security restriction bypass on the
Multiple vulnerabilities were identified in MongoDB. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure System / Technologies affected MongoD
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Une vulnérabilité a été découverte dans Tenable Nessus Agent. Elle permet à un attaquant de provoquer un déni de service.
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans PostgreSQL. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans HAProxy. Elles permettent à un attaquant de provoquer un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
View CSAF Summary Polarion before V2506 contains a vulnerability that could allow authenticated remote attackers to conduct cross-site scripting attacks. Siemens has released new versions for the affected products and recommends to update to the latest versions. The following versions of Siemens Pol
View CSAF Summary Multiple Siemens products are affected by two local privilege escalation vulnerabilities which could allow an low privileged attacker to load malicious DLLs, potentially leading to arbitrary code execution with elevated privileges. Siemens has released new versions for the affected
View CSAF Summary Siemens NX is affected by multiple file parsing vulnerabilities that could be triggered when the application reads files in CGM format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to a
View CSAF Summary Solid Edge uses PS/IGES Parasolid Translator Component that contains an out of bounds read that could be triggered when the application reads files in IGS file formats. If a user is tricked to open a malicious file with any of the affected products, this could lead the application
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-43468 Microsoft Configuration Manager SQL Injection Vulnerability CVE-2025-15556 Notepad++ Download of Code Without Integrity Check Vulnerability CVE-2025-
View CSAF Summary The Webhooks implementation of Siveillance Video Management Servers contains a vulnerability that could allow an authenticated remote attacker with read-only privileges to achieve full access to Webhooks API. Siemens has released new versions for the affected products and recommend
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to obtain remote code execution. The following versions of Airleader Master are affected: Airleader Master <=6.381 (CVE-2026-1358) CVSS Vendor Equipment Vulnerabilities v3 9.8 Airleader GmbH Airleader Master Unre
View CSAF Summary Versions V6.0 through V8 QU1 of the Desigo CC product family (Desigo CC, Desigo CC Compact, Desigo CC Connect, Cerberus DMS), as well as the Desigo CC-based SENTRON Powermanager, are affected by a vulnerability in the underlying third-party component WIBU Systems CodeMeter Runtime.
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition and security restriction bypass on the targeted system. Impact Remote Code Execution Security Restriction Bypass Deni
A vulnerability has been identified in BeyondTrust Products. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Note: CVE-2026-1731 is being exploited in the wild. By sending specially crafted requests, an... Impact Remote Code Execution Syste
Multiple vulnerabilities were identified in QNAP NAS. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass, remote code execution, denial of service condition, sensitive information disclosure and data manipulation on the targeted system. Impact Denial
Microsoft has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes Windows High Risk Elevation of Privilege Remote Code Execution Security Restriction Bypass Denial of Service Spoofing Information Disclosure CVE-2026-... Impact Remote Code Execution Denial
Adobe has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes Details (including CVE) Adobe Audition Medium Risk Remote Code Execution Denial of Service APSB26-14 Adobe After Effects Medium Risk ... Impact Remote Code Execution Denial of Service Informati
Multiple vulnerabilities were identified in Aruba Product. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, sensitive information disclosure, data manipulation, security restriction bypass and elevation of privilege on the targeted system. Impact Elevatio
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, data manipulation, sensitive information disclosure and security restriction bypass on the targeted system. Impact Security Restriction Bypas
Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, cross-site scripting, data manipulation, information disclosure and security restriction bypass on the targeted system. Impact Denial of Service S
De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.
Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure E
A vulnerability has been identified in Fortinet FortiClientEMS. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Impact Remote Code Execution System / Technologies affected FortiClientEMS 7.4.4 Solutions Before installation of the software,
Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass, data manipulation, denial of service condition, elevation of privilege and remote code execution on the targeted system. Impact Denial o
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Mitel Micollab. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited numbe
On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remedia
On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affec
On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulne
On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet b
On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the Arcane
On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild. It is recommended updating as soon as possib
On September 17, 2025, SolarWinds released a security advisory addressing a critical vulnerability in its Web Help Desk product. The fix provided as part of this advisory is a patch bypass of CVE-24-28988, which in turn is a patch bypass of CVE-2024-28986. It is recommended updating affected assets