Recent Advisories
Achtung: You can now also find information from the Vulnerability Advisory Service in the CTI portal!
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
| Risk | Advisory | Date | Status | Title |
|---|---|---|---|---|
| 2026-0154 | 2026-01-21 | new | Oracle Secure Backup: Vulnerability allows to compromise Confidentiality and Integrity | |
| 2026-0153 | 2026-01-21 | new | Oracle NoSQL Database: Vulnerability allows to compromise Confidentiality, Integrity and Availability | |
| 2026-0152 | 2026-01-21 | new | Oracle Database Server: Multiple Vulnerabilities | |
| 2026-0148 | 2026-01-21 | update | Red Hat OpenStack (keystonemiddleware): Vulnerability allows bypassing security measures and potentially privilege escalation | |
| 2026-0135 | 2026-01-21 | update | WHISPERPAIR Google Fast Pair Bluetooth protocol: Vulnerability allows information disclosure | |
| 2026-0134 | 2026-01-21 | update | STACKWARP AMD EPYC Processors: Vulnerability allows manipulation of data | |
| 2026-0124 | 2026-01-21 | update | Red Hat Enterprise Linux (transfig): Vulnerability allows code execution | |
| 2025-2327 | 2026-01-21 | update | IBM WebSphere Application Server: Vulnerability allows manipulation of files and potentially bypassing security measures | |
| 2025-2251 | 2026-01-21 | update | Apache Tomcat: Multiple Vulnerabilities | |
| 2025-2169 | 2026-01-21 | update | Squid: Vulnerability allows bypassing security measures and information disclosure | |
| 2025-2002 | 2026-01-21 | update | IBM WebSphere Application Server: Vulnerability allows Denial of Service | |
| 2025-1993 | 2026-01-21 | update | Squid: Vulnerability allows unspecified attack | |
| 2025-1886 | 2026-01-21 | update | Erlang/OTP: Multiple Vulnerabilities | |
| 2025-1442 | 2026-01-21 | update | Oracle MySQL: Multiple Vulnerabilities | |
| 2025-1007 | 2026-01-21 | update | CPython: Vulnerability allows Denial of Service | |
| 2022-2176 | 2026-01-21 | update | SHA-3 implementations: Vulnerability allows code execution | |
| 2026-0151 | 2026-01-20 | new | Keycloak (OIDC Dynamic Client Registration): Vulnerability allows manipulation of files | |
| 2026-0150 | 2026-01-20 | new | TYPO3 Extension: Multiple Vulnerabilities allow manipulation of files | |
| 2026-0149 | 2026-01-20 | new | Devolutions Server: Multiple Vulnerabilities | |
| 2026-0145 | 2026-01-20 | new | MailPit: Multiple Vulnerabilities | |
| 2026-0144 | 2026-01-20 | new | Keycloak (SAML brokering): Vulnerability allows manipulation of files | |
| 2026-0018 | 2026-01-20 | update | Red Hat Enterprise Linux (Quarkus): Multiple Vulnerabilities | |
| 2025-2581 | 2026-01-20 | update | Microsoft Windows: Multiple Vulnerabilities | |
| 2025-2116 | 2026-01-20 | update | Microsoft JDBC Driver for SQL Server: Vulnerability allows display of false data | |
| 2025-1318 | 2026-01-20 | update | Dell Secure Connect Gateway: Multiple Vulnerabilities allow unspecified attack |