Showing 110 advisories
A vulnerability was found in Pagure. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the component reStructuredText File Handler. Performing a manipulation results in path traversal. This vulnerability is identified as CVE-2026-3312. The attack can be ini
A vulnerability was found in wproyal Royal Addons for Elementor Plugin up to 1.7.1049 on WordPress. It has been declared as problematic. Affected is the function get_main_query_args. Such manipulation leads to missing authorization. This vulnerability is referenced as CVE-2026-2373. It is possible t
A vulnerability was found in sjcl. It has been classified as problematic. This impacts the function sjcl.ecc.basicKey.publicKey. This manipulation causes improper verification of cryptographic signature. The identification of this vulnerability is CVE-2026-4258. It is possible to initiate the attack
A vulnerability was found in KeePassXC and classified as problematic. This affects an unknown function of the component OpenSSL Configuration. The manipulation results in uncontrolled search path. This vulnerability was named CVE-2026-4158. The attack needs to be approached locally. There is no avai
A vulnerability has been found in ChargePoint Home Flex and classified as critical. The impacted element is an unknown function of the component revssh Service. The manipulation leads to command injection. This vulnerability is uniquely identified as CVE-2026-4157. The attack can only be initiated w
A vulnerability, which was classified as critical, was found in ChargePoint Home Flex. The affected element is the function getpreq of the component OCPP Handler. Executing a manipulation can lead to stack-based buffer overflow. This vulnerability is handled as CVE-2026-4156. The attack can only be
A vulnerability, which was classified as problematic, has been found in ChargePoint Home Flex. Impacted is an unknown function. Performing a manipulation results in information disclosure. This vulnerability is known as CVE-2026-4155. Remote exploitation of the attack is possible. No exploit is avai
A vulnerability classified as problematic was found in Sonos Era 300. This issue affects some unknown processing of the component SMB Response Handler. Such manipulation leads to out-of-bounds read. This vulnerability is traded as CVE-2026-4149. The attack may be launched remotely. There is no explo
A vulnerability classified as critical has been found in GIMP. This vulnerability affects unknown code of the component HDR File Parser. This manipulation causes heap-based buffer overflow. This vulnerability appears as CVE-2026-2049. The attack may be initiated remotely. There is no available explo
A vulnerability described as critical has been identified in GIMP. This affects an unknown part of the component LBM File Parser. The manipulation results in heap-based buffer overflow. This vulnerability is reported as CVE-2026-2046. The attack can be launched remotely. No exploit exists. It is bes
A vulnerability marked as critical has been reported in Linux Kernel. Affected by this issue is some unknown functionality of the component nf_tables_newset. The manipulation leads to out-of-bounds write. This vulnerability is documented as CVE-2022-1972. The attack needs to be performed locally. Th
A vulnerability labeled as critical has been found in TODDR YAML::Syck up to 1.36 on Perl. Affected by this vulnerability is an unknown functionality of the component base64 Decoder. Executing a manipulation can lead to heap-based buffer overflow. This vulnerability is registered as CVE-2026-4177. I
A vulnerability identified as critical has been detected in wpxpo WowStore Plugin up to 4.4.3 on WordPress. Affected is an unknown function. Performing a manipulation results in sql injection. This vulnerability is cataloged as CVE-2026-2579. It is possible to initiate the attack remotely. There is
A vulnerability was identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger remote code execution, security restriction bypass and data manipulation on the targeted system. Note: CVE-2026-3909 is being exploited in the wild. A... Impact Remote Code Execution Secur
A vulnerability categorized as critical has been discovered in Oracle Linux 8/9/10. This impacts an unknown function of the component dtprobed. Such manipulation leads to denial of service. This vulnerability is listed as CVE-2026-21991. The attack must be carried out locally. There is no available
A vulnerability was found in frdel/agent0ai agent-zero 0.9.7. It has been rated as critical. This affects the function handle_pdf_document of the file python/helpers/document_query.py. This manipulation causes server-side request forgery. This vulnerability is tracked as CVE-2026-4308. The attack is
A vulnerability was found in frdel/agent0ai agent-zero 0.9.7-10. It has been declared as critical. The impacted element is the function get_abs_path of the file python/helpers/files.py. The manipulation results in path traversal. This vulnerability is identified as CVE-2026-4307. The attack can be e
A vulnerability was found in Forgejo up to 13.0.3. It has been classified as problematic. The affected element is an unknown function of the component File Attachment Handler. The manipulation leads to denial of service. This vulnerability is referenced as CVE-2025-68971. Remote exploitation of the
A vulnerability was found in Mattermost up to 10.11.10/11.2.2/11.3.0 and classified as problematic. Impacted is an unknown function of the component Websocket Message Handler. Executing a manipulation can lead to improper validation of specified type of input. The identification of this vulnerabilit
A vulnerability has been found in ZwickRoell Test Data Management up to 3.0.7 and classified as critical. This issue affects some unknown processing of the file /server/node_upgrade_srv.js. Performing a manipulation of the argument firmware results in path traversal. This vulnerability was named CVE
A vulnerability, which was classified as critical, was found in kubectl-mcp-server 1.2.0. This vulnerability affects unknown code of the file minimal_wrapper.py. Such manipulation leads to os command injection. This vulnerability is uniquely identified as CVE-2025-69902. The attack can be launched r
Serial number: AV26-244Date: March 16, 2026 On March 16, 2026, HPE published a security advisory to address a vulnerability in the following product: HPE Telco Service Orchestrator – versions prior to v4.2.12 The Cyber Centre encourages users and administrators to review the provided web links and a
Serial number: AV25-391Date: July 3, 2025Updated: March 16, 2026 On May 14, 2025, Wing FTP a published an update to address a critical vulnerability in the following product: Wing FTP Server – version v7.4.3 and prior Open-source reporting has indicated that proof-of-concept exploit code is availabl
Serial number: AV26-243Date: March 16, 2026 On March 13, 2026, Microsoft published a security update to address vulnerabilities in the following product: Microsoft Edge Stable Channel – versions prior to 146.0.3856.59 Microsoft has indicated that CVE-2026-3910 has an available exploit. The Cyber Cen
Serial number: AV26-242Date: March 16, 2026 Between March 9 and 15, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products: Red Hat CodeReady Linux Builder – multiple
Serial number: AV26-241Date: March 16, 2026 Between March 9 and 15, 2026, CISA published ICS advisories to address vulnerabilities in the following products: Apeman Cameras ID71 – all versions Ceragon Siklu MultiHaul and EtherHaul Series – multiple versions Honeywell IQ4x BMS Controller – multiple v
Serial number: AV26-240Date: March 16, 2026 On March 13, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 146.0.7680.80 (Windows/Mac) and 146.0.7680.80 (Linux) On March 13, 2026, Cybersecurity and In
Serial number: AV26-239Date: March 16, 2026 Between March 9 and 15, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products: Ubuntu 22.04 LTS Ubuntu 24.04 LTS The Cyber Centre encourages users and administrators to review the web links
Serial number: AV26-238Date: March 16, 2026 Between March 9 and 15, 2026, Dell published security advisories to address vulnerabilities in multiple products: Dell Avamar Data Store Gen5A – versions prior to 2.25.0 and 24.0.0 Dell Connectrix B-Series FOS and SANnav – multiple versions Dell Connectrix
Serial number: AV26-237Date: March 16, 2026 Between March 9 and 15, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following: Cloudera Data Platform Private Cloud Base with IBM (CDP) – version 7.1.9 Cloudera Data Platfo
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-47813 Wing FTP Server Information Disclosure Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses signifi
Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure E
A vulnerability was identified in Microsoft products. A remote attacker could exploit this vulnerability to trigger sensitive information disclosure and data manipulation on the targeted system. Impact Information Disclosure Data Manipulation System / Technologies affected Microsoft Office: Excel (i
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, spoofing and sensitive information disclosure on the targeted system. Note: CVE-2026-.
Solutions HKCERT urges the public to remain vigilant and never enter any information or make payments on suspicious websites. If you receive suspicious SMS messages or emails purporting to be from WSD, do not click on any links and do not provide personal or payment information. If you need to check
Serial number: AV26-235Date: March 13, 2026Updated: March 13, 2026 On March 12, 2026, Google published a security advisory to address vulnerabilities in the following product: Stable Channel Chrome for Desktop – versions prior to 146.0.7680.75/76 (Windows/Mac) and 146.0.7680.75 (Linux) Google is awa
Serial number: AV26-236Date: March 13, 2026 On March 11, 2026, ABB published a security advisory to address vulnerabilities in the following products: AWIN GW100 rev.2 – versions 2.0-0 to 2.0-1 AWIN GW120 – versions 1.2-0 to 1.2-1. The Cyber Centre encourages users and administrators to review the p
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3909 Google Skia Out-of-Bounds Write Vulnerability CVE-2026-3910 Google Chromium V8 Unspecified Vulnerability These types of vulnerabilities are frequent at
Multiple vulnerabilities were identified in Cisco IOS XR. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected Cisco IOS XR
Multiple vulnerabilities were identified in Erlang/OTP. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system. Impact Denial of Service Information Disclosure System / Technologies affected Ver
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, security restriction bypass and data manipulation on the targeted system. Note: CVE-2026-3909 is being exploited in the wild. ... Impact Data Man
Serial number: AV26-234Date: March 12, 2026 On March 12, 2026, HPE published a security advisory to address a vulnerability in the following product: HPE Compute Scale-up Server 3200 – versions prior to v1.70.74 The Cyber Centre encourages users and administrators to review the provided web links an
Serial number: AV26-233Date: March 12, 2026 On March 11, 2026, Apple published security updates to address vulnerabilities in the following products: iOS – versions prior to 16.7.15 iPadOS – versions prior to 16.7.15 iOS – versions prior to 15.8.7 iPadOS – versions prior to 15.8.7 The Cyber Centre e
Serial number: AV26-232Date: March 12, 2026 On March 12, 2026, ABB published a security advisory to address a vulnerability in the following product: AC500 V3 – firmware version 3.9.0 The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested miti
Serial number: AV26-231Date: March 12, 2026 On March 10, 2026, Zoom published security advisories to address vulnerabilities in the following products: Zoom Meeting SDK for Windows – versions prior to 6.6.11 Zoom Rooms for Windows – versions prior to 6.6.5 Zoom Workplace for Windows – versions prior
Serial number: AV26-230Date: March 12, 2026 On March 10, 2026, GitHub published security advisories to address vulnerabilities in the following products: GitHub Enterprise Server – versions 3.19.x prior to 3.19.3 GitHub Enterprise Server – versions 3.18.x prior to 3.18.6 GitHub Enterprise Server – v
Serial number: AV26-229 Date: March 12, 2026 On March 12, 2026, Veeam published security advisories to address critical vulnerabilities in the following products: Veeam Backup & Replication – 12 versions prior to 12.3.2.4165 Veeam Backup & Replication – 13 versions prior to 13.0.1.2067 The Cyber Cen
Serial number: AV26-228Date: March 12, 2026 On March 11, 2026, Palo Alto Networks published security advisories to address vulnerabilities in the following products: Cortex XDR Broker VM 30.0.0 – versions prior to 30.0.49 Cortex XDR Agent 8.7-CE – versions prior to 8.7.101-CE on macOS Cortex XDR Age
Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, cross-site scripting, data manipulation, information disclosure and security restriction bypass on the targeted system. Impact Denial of Service S
Serial number: AV26-227Date: March 12, 2026 On March 11, 2026, Splunk published security advisories to address vulnerabilities in the following products: Splunk Enterprise – multiple versions Splunk Cloud Platform – multiple versions Splunk AppDynamics On-Premises Enterprise Console – versions prior
View CSAF Summary SIDIS Prime before V4.0.800 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, and several Node.js packages as described below. Siemens has released a new version of SIDIS Prime and recommends to update to the latest version. The following versions of Siemen
View CSAF Summary Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products. Siemens has released a new version for RUGGEDCOM APE1808 and recommends to update to the latest version. The following versions of Siemens RUGGEDCOM APE180
View CSAF Summary SIMATIC S7-1500 devices contain a vulnerability that could allow an attacker to inject code by tricking a legitimate user into importing a specially crafted trace file in the web interface. Siemens has released new versions for several affected products and recommends to update to
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information, execute arbitrary commands, or perform a denial-of-service on the product. The following versions of Trane Tracer SC, Tracer SC+, and Tracer Concierge are affected: Tracer SC
View CSAF Summary Heliox EV Chargers listed below contain improper access control vulnerability that could allow an attacker to reach unauthorized services via the charging cable. Siemens has released new versions for the affected products and recommends to update to the latest versions. The followi
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to execute malicious code with OS application service account permissions that the authenticated, privileged application user did not intend on running. The following versions of Inductive Automation Ignition Sof
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure and security restriction bypass on the targeted system. Impact Security Restriction Bypass Information Discl
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, spoofing and sensitive information disclosure on the targeted system. Impact Informatio
Multiple vulnerabilities were identified in Mozilla Firefox. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass and remote code execution on the targeted system. Impact Remote Code Execution Security Restriction Bypass System / Technologies affected
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Une vulnérabilité a été découverte dans GLPI. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Cisco IOS XR. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service à distance. L'éditeur fournit des recommandations dans l'attente de la publication de nouvelles versions applicatives.
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un problème de sécurité non spécifié par l'éditeur.
Serial number: AV25-857Date: December 22, 2025Updated: March 11, 2026 On December 19, 2025, n8n published a security update to address a critical vulnerability in the following product: n8n workflow automation – versions 0.211.0 to versions prior to 1.120.4 Update 1 On March 11, 2026, Cybersecurity
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber acto
Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger security restriction bypass and remote code execution on the targeted system. Impact Remote Code Execution Security Restriction Bypass System / Technologies affected AOS-CX 10
Adobe has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes Details (including CVE) Adobe Commerce Medium Risk Cross-site Scripting Elevation of Privilege Security Restriction Bypass Remote Code Execution Information Disclosure... Impact Remote Code Exe
Microsoft has released monthly security update for their products: Vulnerable Product Risk Level Impacts Notes SQL Server Medium Risk Elevation of Privilege Azure Medium Risk Elevation of Privilege Information Disclosure Spoofing Windows Medium Risk Elevation... Impact Remote Code Execution Denial o
Multiple vulnerabilities were identified in Zoom Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege on the targeted system. Impact Elevation of Privilege System / Technologies affected Zoom Meeting SDK for Windows before version 6.6.11 in the 6.
En 2025, les frontières qui existent traditionnellement entre acteurs étatiques et cybercriminels ont continué de s’éroder, complexifiant notamment le processus d'imputation. Ainsi par exemple le détournement, à des fins malveillantes, d’outils et de services légitimes, n'est plus une pratique...
De multiples vulnérabilités ont été découvertes dans Curl. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
De multiples vulnérabilités ont été découvertes dans Microsoft .Net. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données. Concernant la vulnérabilité CVE-2025-66178,...
Une vulnérabilité a été découverte dans Ivanti Desktop and Server Management (DSM). Elle permet à un attaquant de provoquer une élévation de privilèges.
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans HPE Aruba Networking AOS-CX. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
De multiples vulnérabilités ont été découvertes dans Traefik. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
View CSAF Summary Successful exploitation of this vulnerability could allow an unauthorized attacker to access controller management settings, control components, disclose information, or cause a denial-of-service condition. The following versions of Honeywell IQ4x BMS Controller are affected: IQ4E
View CSAF Summary Successful exploitation of this vulnerability could result in arbitrary file upload to the target equipment. The following versions of Ceragon Siklu MultiHaul and EtherHaul Series are affected: MultiHaul MH-B100-CCS MultiHaul MH-T200-CCC MultiHaul MH-T200-CNN MultiHaul MH-T201-CNN
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to take control of the device or view camera feeds. The following versions of Apeman Cameras are affected: ID71 vers:all/* (CVE-2025-11126, CVE-2025-11851, CVE-2025-11852) CVSS Vendor Equipment Vulnerabilities
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication and execute code with root-level privileges. The following versions of Lantronix EDS3000PS and EDS5000 are affected: EDS3000PS 3.1.0.0R2 (CVE-2025-67039, CVE-2025-70082, CVE-2025-67041
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-22054 Omnissa Workspace ONE Server-Side Request Forgery CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability CVE-2026-1
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system. Impact
A vulnerability has been identified in pac4j-jwt. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: Proof of Concept exploit code Is publicly available for CVE-2026-29000. Attackers who possess the server'... Impact Security
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system. Impact I
A research has been identified a new Wi‑Fi attack technique called AirSnitch. An attacker connected to the Wi-Fi network can spoof a victim device’s physical MAC address, allowing them to intercept traffic originally intended for the victim. In some cases, ... Impact Information Disclosure Denial of
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnera
View CSAF Summary Successful exploitation of this vulnerability could result in an attacker achieving remote code execution on the device. The following versions of Delta Electronics CNCSoft-G2 are affected: CNCSoft-G2 CVSS Vendor Equipment Vulnerabilities v3 7.8 Delta Electronics Delta Electronics
View CSAF Summary Successful exploitation of these vulnerabilities could allow a remote attacker to cause a denial-of-service condition by continuously sending UDP packets to the affected products. The following versions of Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet modul
View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks. The following versions of Mobiliti e-mobi.hu are affected: e-mobi.hu
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulnerability These types
View CSAF Summary Hitachi Energy is aware of vulnerabilities that affect RTU500 product versions listed in this document. Successful exploitation of these vulnerabilities can result in the exposure of low-value user management information and device outage. Please refer to the Recommended Immediate
On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is
On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited numbe
On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remedia
On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affec
On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulne
On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet b
On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the Arcane
On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild. It is recommended updating as soon as possib