Recent Advisories
Achtung: You can now also find information from the Vulnerability Advisory Service in the CTI portal!
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
| Risk | Advisory | Date | Status | Title |
|---|---|---|---|---|
| 2026-0167 | 2026-01-21 | new | Oracle PeopleSoft: Multiple Vulnerabilities | |
| 2026-0165 | 2026-01-21 | new | Oracle JD Edwards: Multiple Vulnerabilities | |
| 2026-0163 | 2026-01-21 | new | Oracle Hyperion: Multiple Vulnerabilities | |
| 2026-0162 | 2026-01-21 | new | Oracle Health Sciences Applications: Multiple Vulnerabilities | |
| 2026-0161 | 2026-01-21 | new | Oracle Fusion Middleware: Multiple Vulnerabilities | |
| 2026-0160 | 2026-01-21 | new | Oracle Financial Services Applications: Multiple Vulnerabilities | |
| 2026-0159 | 2026-01-21 | new | Oracle Enterprise Manager: Multiple Vulnerabilities | |
| 2026-0158 | 2026-01-21 | new | Oracle E-Business Suite: Multiple Vulnerabilities | |
| 2026-0157 | 2026-01-21 | new | Oracle Construction and Engineering: Multiple Vulnerabilities | |
| 2026-0156 | 2026-01-21 | new | Oracle Communications: Multiple Vulnerabilities | |
| 2026-0155 | 2026-01-21 | new | Oracle Commerce: Multiple Vulnerabilities | |
| 2026-0154 | 2026-01-21 | new | Oracle Secure Backup: Vulnerability allows to compromise Confidentiality and Integrity | |
| 2026-0153 | 2026-01-21 | new | Oracle NoSQL Database: Vulnerability allows to compromise Confidentiality, Integrity and Availability | |
| 2026-0152 | 2026-01-21 | new | Oracle Database Server: Multiple Vulnerabilities | |
| 2026-0135 | 2026-01-21 | update | WHISPERPAIR Google Fast Pair Bluetooth protocol: Vulnerability allows information disclosure | |
| 2026-0124 | 2026-01-21 | update | Red Hat Enterprise Linux (transfig): Vulnerability allows code execution | |
| 2025-2327 | 2026-01-21 | update | IBM WebSphere Application Server: Vulnerability allows manipulation of files and potentially bypassing security measures | |
| 2025-2169 | 2026-01-21 | update | Squid: Vulnerability allows bypassing security measures and information disclosure | |
| 2025-1993 | 2026-01-21 | update | Squid: Vulnerability allows unspecified attack | |
| 2025-1442 | 2026-01-21 | update | Oracle MySQL: Multiple Vulnerabilities | |
| 2025-1007 | 2026-01-21 | update | CPython: Vulnerability allows Denial of Service | |
| 2022-2176 | 2026-01-21 | update | SHA-3 implementations: Vulnerability allows code execution | |
| 2026-0150 | 2026-01-20 | new | TYPO3 Extension: Multiple Vulnerabilities allow manipulation of files | |
| 2026-0149 | 2026-01-20 | new | Devolutions Server: Multiple Vulnerabilities | |
| 2025-2581 | 2026-01-20 | update | Microsoft Windows: Multiple Vulnerabilities |
PreviousNext
- Page 1
- Page 2
- Page 3
- Page 4
- Page 5
- Page 6
- Page 7
- Page 8
- Page 9
- Page 10
- Page 11
- Page 12
- Page 13
- Page 14
- Page 15
- Page 16
- Page 17
- Page 18
- Page 19
- Page 20
- Page 21
- Page 22
- Page 23
- Page 24
- Page 25
- Page 26
- Page 27
- Page 28
- Page 29
- Page 30
- Page 31
- Page 32
- Page 33
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Page 41
- Page 42
- Page 43
- Page 44
- Page 45
- Page 46
- Page 47
- Page 48
- Page 49
- Page 50
- Page 51
- Page 52
- Page 53
- Page 54
- Page 55
- Page 56
- Page 57
- Page 58
- Page 59
- Page 60