Recent Advisories
Achtung: You can now also find information from the Vulnerability Advisory Service in the CTI portal!
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
The CTI portal is available at the following address: https://cti-portal.telekom.net/portal/cti/advisories
| Risk | Advisory | Date | Status | Title |
|---|---|---|---|---|
| 2022-1067 | 2025-07-30 | update | GIMP: Vulnerability allows Denial of Service | |
| 2018-0136 | 2025-07-30 | update | libcurl: Multiple Vulnerabilities | |
| 2025-1531 | 2025-07-29 | new | JetBrains TeamCity: Multiple Vulnerabilities | |
| 2025-1529 | 2025-07-29 | new | Dell ECS: Vulnerability allows bypassing security measures | |
| 2025-1528 | 2025-07-29 | new | Palo Alto Networks GlobalProtect App: Vulnerability allows Denial of Service | |
| 2025-1510 | 2025-07-29 | update | xwiki: multiply Vulnerabilities allows to perform a SQL Injection | |
| 2025-1478 | 2025-07-29 | update | Keycloak: Vulnerability allows privilege escalation | |
| 2025-1392 | 2025-07-29 | update | Keycloak: Account takeover via email verification step manipulation | |
| 2024-0472 | 2025-07-29 | update | Golang Go: Multiple Vulnerabilities allow unspecified attack | |
| 2019-0562 | 2025-07-29 | update | Oracle Utilities: Multiple Vulnerabilities | |
| 2015-0081 | 2025-07-29 | update | Oracle Java SE, and Oracle JRockit: Multiple Vulnerabilities | |
| 2013-1056 | 2025-07-29 | update | Google Chrome: Multiple Vulnerabilities | |
| 2025-1523 | 2025-07-28 | new | Commvault Backup & Recovery: Vulnerability allows SQL injection | |
| 2025-1522 | 2025-07-28 | new | IBM Informix Dynamic Server: Multiple Vulnerabilities | |
| 2025-1521 | 2025-07-28 | new | Sitecore Experience Manager: Multiple Vulnerabilities | |
| 2025-1520 | 2025-07-28 | new | WinRAR: Vulnerability allows code execution | |
| 2025-1519 | 2025-07-28 | new | HP DesignJet: Vulnerability allows information disclosure | |
| 2025-1518 | 2025-07-28 | new | IBM Cognos Analytics (Python JSON Logger): Vulnerability allows code execution | |
| 2025-1516 | 2025-07-28 | new | JHipster: Vulnerability allows gaining administrative rights | |
| 2025-1456 | 2025-07-28 | update | Google Chrome / Microsoft Edge: Multiple vulnerabilities | |
| 2025-1328 | 2025-07-28 | update | Microsoft Edge: Vulnerability allows execution of arbitrary code with user rights | |
| 2025-1312 | 2025-07-28 | update | Google Chrome / Microsoft Edge: Vulnerability allows code execution | |
| 2025-1281 | 2025-07-28 | update | Google Chrome / Microsoft Edge: Multiple Vulnerabilities | |
| 2025-1226 | 2025-07-28 | update | Google Chrome and Microsoft Edge: Multiple Vulnerabilities | |
| 2025-1185 | 2025-07-28 | update | Google Chrome and Microsoft Edge: Multiple Vulnerabilities allow code execution |
PreviousNext
- Page 1
- Page 2
- Page 3
- Page 4
- Page 5
- Page 6
- Page 7
- Page 8
- Page 9
- Page 10
- Page 11
- Page 12
- Page 13
- Page 14
- Page 15
- Page 16
- Page 17
- Page 18
- Page 19
- Page 20
- Page 21
- Page 22
- Page 23
- Page 24
- Page 25
- Page 26
- Page 27
- Page 28
- Page 29
- Page 30
- Page 31
- Page 32
- Page 33
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Page 41
- Page 42
- Page 43
- Page 44
- Page 45
- Page 46
- Page 47
- Page 48
- Page 49
- Page 50
- Page 51
- Page 52
- Page 53
- Page 54
- Page 55
- Page 56
- Page 57
- Page 58
- Page 59
- Page 60
- Page 61
- Page 62
- Page 63
- Page 64
- Page 65
- Page 66
- Page 67
- Page 68
- Page 69
- Page 70
- Page 71
- Page 72
- Page 73
- Page 74
- Page 75
- Page 76
- Page 77
- Page 78
- Page 79
- Page 80
- Page 81
- Page 82
- Page 83
- Page 84
- Page 85