CERT-Bund Security Advisories
Tuesday, March 17, 2026
Kubernetes Vulnerability Allows Remote File Manipulation
CERT-Bund has issued a security advisory (WID-SEC-2026-0738) regarding a vulnerability in Kubernetes that allows remote authenticated attackers to manipulate files. The vulnerability affects the Open Source Kubernetes CSI Driver for NFS versions prior to 4.13.1 and has a CVSS Base Score of 6.5.
Gitea Vulnerabilities Allow Bypass, Data Manipulation, Disclosure
CERT-Bund has issued a security advisory for Gitea, detailing multiple vulnerabilities with a CVSS base score of 7.3. These vulnerabilities can allow attackers to bypass security measures, manipulate data, and disclose confidential information. Users are advised to update to Gitea version 1.25.5 or later.
NetBox Cross-Site Scripting Vulnerability Advisory
CERT-Bund has issued a security advisory for NetBox, detailing a vulnerability that allows for Cross-Site Scripting attacks. The advisory affects NetBox version 4.3.5 and provides information on mitigation strategies.
Monday, March 16, 2026
GNU InetUtils Multiple Vulnerabilities (CVSS 9.8)
CERT-Bund has issued a security advisory (WID-SEC-2026-0734) regarding critical vulnerabilities in GNU InetUtils versions up to 2.7. These vulnerabilities, rated CVSS 9.8, allow for remote code execution and information disclosure on Linux and UNIX systems. Users are advised to update their systems.
Dell Secure Connect Gateway Vulnerability Allows Code Execution
CERT-Bund has issued a security advisory for Dell Secure Connect Gateway, identifying a vulnerability that allows remote code execution. The advisory affects versions prior to 5.34.00.00 on Windows systems. Users are advised to apply available mitigations.
CERT-Bund Security Advisory WID-SEC-2026-0733
CERT-Bund has issued security advisory WID-SEC-2026-0733, detailing a new vulnerability. This advisory provides technical details and recommendations for affected parties to mitigate potential security risks.
OpenClaw Vulnerabilities Allow Code Execution and Privilege Escalation
CERT-Bund has issued a security advisory (WID-SEC-2026-0727) regarding critical vulnerabilities in OpenClaw, a personal AI assistant. The vulnerabilities, with a CVSS Base Score of 9.9, allow for code execution, privilege escalation, data manipulation, and denial-of-service attacks.
Angular XSS Vulnerability Advisory
CERT-Bund has issued a security advisory for Angular, detailing a Cross-Site Scripting (XSS) vulnerability with a CVSS score of 8.0. The advisory affects specific versions of open-source Angular and provides mitigation information.
OpenSSL Vulnerability Allows Bypassing Security Measures
CERT-Bund has issued a security advisory for OpenSSL versions prior to 3.6.2 and 3.5.6. A remote, authenticated attacker can exploit a vulnerability to bypass security measures. Mitigation is available.
OpenBSD Vulnerability Allows Attack and Denial of Service
CERT-Bund has issued a security advisory (WID-SEC-2026-0730) regarding a vulnerability in OpenBSD versions prior to 7.8. The vulnerability could allow an attacker to perform unspecified attacks and potentially cause a denial of service. The advisory includes a CVSS base score of 7.5.
Source details
Activity
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get CERT-Bund Security Advisories alerts
We'll email you when CERT-Bund Security Advisories publishes new changes.