Recent changes

Favicon for wid.cert-bund.de

CPython Vulnerabilities Allow File Manipulation and DoS

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in CPython versions prior to 3.15.0. These vulnerabilities can be exploited by authenticated remote attackers to manipulate files or cause a denial-of-service condition. The advisory provides mitigation information for affected systems.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

OpenClaw AI Assistant Vulnerabilities

CERT-Bund has issued a security advisory for OpenClaw, an AI assistant, detailing multiple vulnerabilities with a high CVSS base score of 8.1. The advisory urges users to mitigate the risks associated with privilege escalation and confidential information disclosure.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

ImageMagick Vulnerability Allows Remote Denial of Service

CERT-Bund has issued a security advisory for ImageMagick, detailing a vulnerability that allows remote denial of service attacks. The advisory affects versions prior to Open Source ImageMagick <7.1.2-17 and <6.9.13-42, impacting Linux, UNIX, and Windows systems.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Mattermost Vulnerabilities: Remote Attack Possible

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in Mattermost Server versions prior to 11.4.0, 11.3.1, 11.2.3, 10.11.11, 11.6.0, 10.11.13, 11.5.1, 11.4.3, and 10.11.13. These vulnerabilities have a CVSS base score of 7.3 and allow for remote attacks.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

OpenCTI Vulnerability Allows Bypassing Security Measures

CERT-Bund has issued a security advisory for OpenCTI, a cyber threat intelligence platform. A vulnerability (CVE) allows remote, authenticated attackers to bypass security measures. The advisory affects OpenCTI versions prior to 6.9.1.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Vercel Next.js Vulnerabilities Allow DoS or Security Bypass

CERT-Bund has issued a security advisory for Vercel Next.js, detailing vulnerabilities that could allow remote attackers to perform Denial of Service attacks or bypass security measures. The advisory affects versions prior to 16.1.7 and 15.5.13, with a CVSS base score of 6.5.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

GNU InetUtils Multiple Vulnerabilities (CVSS 9.8)

CERT-Bund has issued a security advisory (WID-SEC-2026-0734) regarding critical vulnerabilities in GNU InetUtils versions up to 2.7. These vulnerabilities, rated CVSS 9.8, allow for remote code execution and information disclosure on Linux and UNIX systems. Users are advised to update their systems.

Urgent Notice Cybersecurity
Favicon for wid.cert-bund.de

CERT-Bund Security Advisory WID-SEC-2026-0733

CERT-Bund has issued security advisory WID-SEC-2026-0733, detailing a new vulnerability. This advisory provides technical details and recommendations for affected parties to mitigate potential security risks.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Dell Secure Connect Gateway Vulnerability Allows Code Execution

CERT-Bund has issued a security advisory for Dell Secure Connect Gateway, identifying a vulnerability that allows remote code execution. The advisory affects versions prior to 5.34.00.00 on Windows systems. Users are advised to apply available mitigations.

Priority review Notice Cybersecurity
Favicon for www.bafin.de

BaFin Warns Consumers About Unauthorized 'Smarter trading' Platforms

BaFin has issued a warning to consumers regarding a series of unauthorized online platforms operating under the slogan 'Smarter trading with zero spreads.' These platforms are suspected of conducting banking business and/or providing financial services without the necessary authorization from BaFin, posing a risk to consumers.

Urgent Notice Financial Services

Showing 101–110 of 156 changes

1 9 10 11 12 13 16

Get Germany alerts

Daily digest of regulatory changes. AI-summarized, no noise.

Free. Unsubscribe anytime.