Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-45351 (GCVE-0-2026-45351)
Vulnerability from cvelistv5 – Published: 2026-05-15 21:09 – Updated: 2026-05-18 19:39- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
| URL | Tags |
|---|---|
| https://github.com/open-webui/open-webui/security… | x_refsource_CONFIRM |
| Vendor | Product | Version | |
|---|---|---|---|
| open-webui | open-webui |
Affected:
< 0.8.9
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-45351",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-18T19:39:16.167751Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-18T19:39:46.217Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "open-webui",
"vendor": "open-webui",
"versions": [
{
"status": "affected",
"version": "\u003c 0.8.9"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.9, when a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application. This vulnerability is fixed in 0.8.9."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-15T21:09:41.689Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx"
}
],
"source": {
"advisory": "GHSA-jh9g-8jqw-m2qx",
"discovery": "UNKNOWN"
},
"title": "Open WebUI: Exposure of System Prompt to Regular User [Non-Admin]"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-45351",
"datePublished": "2026-05-15T21:09:41.689Z",
"dateReserved": "2026-05-11T21:40:08.178Z",
"dateUpdated": "2026-05-18T19:39:46.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-45351",
"date": "2026-05-24",
"epss": "0.00038",
"percentile": "0.11539"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-45351\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-05-15T22:16:55.453\",\"lastModified\":\"2026-05-18T20:16:39.260\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.9, when a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application. This vulnerability is fixed in 0.8.9.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.8.9\",\"matchCriteriaId\":\"DB503E56-0C74-48FD-96BB-7CEC7FBED129\"}]}]}],\"references\":[{\"url\":\"https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-45351\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-18T19:39:16.167751Z\"}}}], \"references\": [{\"url\": \"https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-18T19:39:35.614Z\"}}], \"cna\": {\"title\": \"Open WebUI: Exposure of System Prompt to Regular User [Non-Admin]\", \"source\": {\"advisory\": \"GHSA-jh9g-8jqw-m2qx\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"open-webui\", \"product\": \"open-webui\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.8.9\"}]}], \"references\": [{\"url\": \"https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx\", \"name\": \"https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.9, when a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application. This vulnerability is fixed in 0.8.9.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-05-15T21:09:41.689Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-45351\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-18T19:39:46.217Z\", \"dateReserved\": \"2026-05-11T21:40:08.178Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-05-15T21:09:41.689Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-45351
Vulnerability from fkie_nvd - Published: 2026-05-15 22:16 - Updated: 2026-05-18 20:16| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx | Exploit, Mitigation, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx | Exploit, Mitigation, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| openwebui | open_webui | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB503E56-0C74-48FD-96BB-7CEC7FBED129",
"versionEndExcluding": "0.8.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.9, when a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application. This vulnerability is fixed in 0.8.9."
}
],
"id": "CVE-2026-45351",
"lastModified": "2026-05-18T20:16:39.260",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-05-15T22:16:55.453",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GHSA-JH9G-8JQW-M2QX
Vulnerability from github – Published: 2026-05-14 20:25 – Updated: 2026-05-19 15:59Summary
A regular user [non-admin] can view the system prompt of the model which is set by an admin.
Details
When a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application
Affected System
Open WebUI v0.6.40 "main" branch
Vulnerability Details and Advisory from OWASP
LLM07:2025 System Prompt Leakage - https://genai.owasp.org/llmrisk/llm072025-system-prompt-leakage/
PoC
1. Regular User [Non-Admin] login on Open WebUI application.
2. A series of web requests get generated by the application, and the http://IP:8080/api/models? is also gets generated by application .
3. The response of http://IP:8080/api/models? web request reveals the system prompt of all the available models which is set is by the admin on models pages in workspace.
Web Request
GET /api/models? HTTP/1.1 Host: localhost:8080 sec-ch-ua-platform: "Linux" authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjdmYjUxMmFhLTBmMTAtNDRkZi1iOWY1LThmNDg2MWFhNWFmOCIsImV4cCI6MTc2NjU2MjE5OH0.yJpavBynKItPQv76SMGKK012JIf29PVUv9sjuCDuRGQ Accept-Language: en-US,en;q=0.9 sec-ch-ua: "Chromium";v="141", "Not?A_Brand";v="8" sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36 Accept: application/json Content-Type: application/json Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost:8080/ Accept-Encoding: gzip, deflate, br Cookie: token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjdmYjUxMmFhLTBmMTAtNDRkZi1iOWY1LThmNDg2MWFhNWFmOCIsImV4cCI6MTc2NjU2MjE5OH0.yJpavBynKItPQv76SMGKK012JIf29PVUv9sjuCDuRGQ Connection: keep-alive
Impact
1. System prompts can reveal the model instructions, providing an attackers with inside knowledge about the system capabilities and bypass restrictions. 2. Attacker can perform content manipulation affecting the input/output of the model.
Details from MITRE ATLAS
Discover LLM System Information - https://atlas.mitre.org/techniques/AML.T0069 Discover LLM System Information: System Instruction Keywords - https://atlas.mitre.org/techniques/AML.T0069.001 Discover LLM System Information: System Prompt - https://atlas.mitre.org/techniques/AML.T0069.002
Recommendation
1. The web response should not reveal system prompt and related internal/back-end details regarding the model to the regular user. 2. Only the model name and non-sensitive details should be revealed to regular user and internal/back-end details should not be disclosed.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 0.8.8"
},
"package": {
"ecosystem": "PyPI",
"name": "open-webui"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.8.9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-45351"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-14T20:25:04Z",
"nvd_published_at": "2026-05-15T22:16:55Z",
"severity": "MODERATE"
},
"details": "### Summary\n_A regular user [non-admin] can view the system prompt of the model which is set by an admin._\n\n### Details\n_When a regular user [non-admin] logs into the application, a http://IP:8080/api/models? web request is initiated by the application and in response, it reveals the system prompt of available models set by admin on models pages in workspace affecting the confidentiality of application_\n\n### Affected System\n_Open WebUI v0.6.40 \"main\" branch_\n\n### Vulnerability Details and Advisory from OWASP\nLLM07:2025 System Prompt Leakage - https://genai.owasp.org/llmrisk/llm072025-system-prompt-leakage/\n\n\n### PoC\n_1. Regular User [Non-Admin] login on Open WebUI application._\n_2. A series of web requests get generated by the application, and the http://IP:8080/api/models? is also gets generated by application ._\n_3. The response of http://IP:8080/api/models? web request reveals the system prompt of all the available models which is set is by the admin on models pages in workspace._\n\u003cimg width=\"940\" height=\"352\" alt=\"system prompt leak\" src=\"https://github.com/user-attachments/assets/bd2c76f1-398f-4bc8-a8b2-5e14a768c560\" /\u003e\n\n### Web Request\nGET /api/models? HTTP/1.1\nHost: localhost:8080\nsec-ch-ua-platform: \"Linux\"\nauthorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjdmYjUxMmFhLTBmMTAtNDRkZi1iOWY1LThmNDg2MWFhNWFmOCIsImV4cCI6MTc2NjU2MjE5OH0.yJpavBynKItPQv76SMGKK012JIf29PVUv9sjuCDuRGQ\nAccept-Language: en-US,en;q=0.9\nsec-ch-ua: \"Chromium\";v=\"141\", \"Not?A_Brand\";v=\"8\"\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36\nAccept: application/json\nContent-Type: application/json\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost:8080/\nAccept-Encoding: gzip, deflate, br\nCookie: token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjdmYjUxMmFhLTBmMTAtNDRkZi1iOWY1LThmNDg2MWFhNWFmOCIsImV4cCI6MTc2NjU2MjE5OH0.yJpavBynKItPQv76SMGKK012JIf29PVUv9sjuCDuRGQ\nConnection: keep-alive\n\n\n### Impact\n_1. System prompts can reveal the model instructions, providing an attackers with inside knowledge about the system capabilities and bypass restrictions._\n_2. Attacker can perform content manipulation affecting the input/output of the model._\n\n### Details from MITRE ATLAS\nDiscover LLM System Information - https://atlas.mitre.org/techniques/AML.T0069\nDiscover LLM System Information: System Instruction Keywords - https://atlas.mitre.org/techniques/AML.T0069.001\nDiscover LLM System Information: System Prompt - https://atlas.mitre.org/techniques/AML.T0069.002\n\n\n### Recommendation\n_1. The web response should not reveal system prompt and related internal/back-end details regarding the model to the regular user._\n_2. Only the model name and non-sensitive details should be revealed to regular user and internal/back-end details should not be disclosed._",
"id": "GHSA-jh9g-8jqw-m2qx",
"modified": "2026-05-19T15:59:58Z",
"published": "2026-05-14T20:25:04Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-jh9g-8jqw-m2qx"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-45351"
},
{
"type": "PACKAGE",
"url": "https://github.com/open-webui/open-webui"
},
{
"type": "WEB",
"url": "https://github.com/open-webui/open-webui/releases/tag/v0.8.9"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Open WebUI Exposes System Prompt to Regular User [Non-Admin]"
}
WID-SEC-W-2026-1542
Vulnerability from csaf_certbund - Published: 2026-05-14 22:00 - Updated: 2026-05-17 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Chrome ist ein Internet-Browser von Google.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Chrome und Microsoft Edge ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um einen Denial of Service Angriff durchzuf\u00fchren, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1542 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1542.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1542 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1542"
},
{
"category": "external",
"summary": "Chrome Releases: Stable Channel Update for Desktop vom 2026-05-14",
"url": "https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop_12.html"
},
{
"category": "external",
"summary": "Release notes for Microsoft Edge Security Updates vom 2026-05-15",
"url": "https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#may-15-2026"
}
],
"source_lang": "en-US",
"title": "Google Chrome und Microsoft Edge: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-17T22:00:00.000+00:00",
"generator": {
"date": "2026-05-18T05:16:10.220+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1542",
"initial_release_date": "2026-05-14T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-14T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-17T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Microsoft aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c148.0.7778.167",
"product": {
"name": "Google Chrome \u003c148.0.7778.167",
"product_id": "T054196"
}
},
{
"category": "product_version",
"name": "148.0.7778.167",
"product": {
"name": "Google Chrome 148.0.7778.167",
"product_id": "T054196-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:148.0.7778.167"
}
}
},
{
"category": "product_version_range",
"name": "\u003c148.0.7778.168",
"product": {
"name": "Google Chrome \u003c148.0.7778.168",
"product_id": "T054197"
}
},
{
"category": "product_version",
"name": "148.0.7778.168",
"product": {
"name": "Google Chrome 148.0.7778.168",
"product_id": "T054197-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:148.0.7778.168"
}
}
}
],
"category": "product_name",
"name": "Chrome"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c148.0.3967.70",
"product": {
"name": "Microsoft Edge \u003c148.0.3967.70",
"product_id": "T054236"
}
},
{
"category": "product_version",
"name": "148.0.3967.70",
"product": {
"name": "Microsoft Edge 148.0.3967.70",
"product_id": "T054236-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:148.0.3967.70"
}
}
}
],
"category": "product_name",
"name": "Edge"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-0251",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-0251"
},
{
"cve": "CVE-2026-45351",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-45351"
},
{
"cve": "CVE-2026-8509",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8509"
},
{
"cve": "CVE-2026-8510",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8510"
},
{
"cve": "CVE-2026-8511",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8511"
},
{
"cve": "CVE-2026-8512",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8512"
},
{
"cve": "CVE-2026-8513",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8513"
},
{
"cve": "CVE-2026-8514",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8514"
},
{
"cve": "CVE-2026-8515",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8515"
},
{
"cve": "CVE-2026-8516",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8516"
},
{
"cve": "CVE-2026-8517",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8517"
},
{
"cve": "CVE-2026-8518",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8518"
},
{
"cve": "CVE-2026-8519",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8519"
},
{
"cve": "CVE-2026-8520",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8520"
},
{
"cve": "CVE-2026-8521",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8521"
},
{
"cve": "CVE-2026-8522",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8522"
},
{
"cve": "CVE-2026-8523",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8523"
},
{
"cve": "CVE-2026-8524",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8524"
},
{
"cve": "CVE-2026-8525",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8525"
},
{
"cve": "CVE-2026-8526",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8526"
},
{
"cve": "CVE-2026-8527",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8527"
},
{
"cve": "CVE-2026-8528",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8528"
},
{
"cve": "CVE-2026-8529",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8529"
},
{
"cve": "CVE-2026-8530",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8530"
},
{
"cve": "CVE-2026-8531",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8531"
},
{
"cve": "CVE-2026-8532",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8532"
},
{
"cve": "CVE-2026-8533",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8533"
},
{
"cve": "CVE-2026-8534",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8534"
},
{
"cve": "CVE-2026-8535",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8535"
},
{
"cve": "CVE-2026-8536",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8536"
},
{
"cve": "CVE-2026-8537",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8537"
},
{
"cve": "CVE-2026-8538",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8538"
},
{
"cve": "CVE-2026-8539",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8539"
},
{
"cve": "CVE-2026-8540",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8540"
},
{
"cve": "CVE-2026-8541",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8541"
},
{
"cve": "CVE-2026-8542",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8542"
},
{
"cve": "CVE-2026-8543",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8543"
},
{
"cve": "CVE-2026-8544",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8544"
},
{
"cve": "CVE-2026-8545",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8545"
},
{
"cve": "CVE-2026-8546",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8546"
},
{
"cve": "CVE-2026-8547",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8547"
},
{
"cve": "CVE-2026-8548",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8548"
},
{
"cve": "CVE-2026-8549",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8549"
},
{
"cve": "CVE-2026-8550",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8550"
},
{
"cve": "CVE-2026-8551",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8551"
},
{
"cve": "CVE-2026-8552",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8552"
},
{
"cve": "CVE-2026-8553",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8553"
},
{
"cve": "CVE-2026-8554",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8554"
},
{
"cve": "CVE-2026-8555",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8555"
},
{
"cve": "CVE-2026-8556",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8556"
},
{
"cve": "CVE-2026-8557",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8557"
},
{
"cve": "CVE-2026-8558",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8558"
},
{
"cve": "CVE-2026-8559",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8559"
},
{
"cve": "CVE-2026-8560",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8560"
},
{
"cve": "CVE-2026-8561",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8561"
},
{
"cve": "CVE-2026-8562",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8562"
},
{
"cve": "CVE-2026-8563",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8563"
},
{
"cve": "CVE-2026-8564",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8564"
},
{
"cve": "CVE-2026-8565",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8565"
},
{
"cve": "CVE-2026-8566",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8566"
},
{
"cve": "CVE-2026-8567",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8567"
},
{
"cve": "CVE-2026-8568",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8568"
},
{
"cve": "CVE-2026-8569",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8569"
},
{
"cve": "CVE-2026-8570",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8570"
},
{
"cve": "CVE-2026-8571",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8571"
},
{
"cve": "CVE-2026-8572",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8572"
},
{
"cve": "CVE-2026-8573",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8573"
},
{
"cve": "CVE-2026-8574",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8574"
},
{
"cve": "CVE-2026-8575",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8575"
},
{
"cve": "CVE-2026-8576",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8576"
},
{
"cve": "CVE-2026-8577",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8577"
},
{
"cve": "CVE-2026-8578",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8578"
},
{
"cve": "CVE-2026-8579",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8579"
},
{
"cve": "CVE-2026-8580",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8580"
},
{
"cve": "CVE-2026-8581",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8581"
},
{
"cve": "CVE-2026-8582",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8582"
},
{
"cve": "CVE-2026-8583",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8583"
},
{
"cve": "CVE-2026-8584",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8584"
},
{
"cve": "CVE-2026-8585",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8585"
},
{
"cve": "CVE-2026-8586",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8586"
},
{
"cve": "CVE-2026-8587",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8587"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.