<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
    <atom:link href="https://docs.invicti.com/ie-is/release-notes/security-vdb-update/rss.xml" rel="self" type="application/rss+xml" />
        <title>Invicti Release Notes – Security releases</title>
        <link>https://docs.invicti.com/ie-is/security-releases</link>
        <description>Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.</description>
        <lastBuildDate>Tue, 07 Apr 2026 12:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <language>en</language>
        <copyright>Copyright © 2026 Invicti</copyright>
        <item>
            <title><![CDATA[Release v20260331]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260331</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260331</guid>
            <pubDate>Tue, 07 Apr 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260407</li>
<li>Updated severity ratings for Grafana versions 9.0.0–9.0.9, 9.1.0–9.1.8, 9.2.1–9.2.7, 9.2.10, 9.2.13, 9.2.15, 9.2.17, 9.3.0–9.3.1, 9.3.4, 9.3.6, 9.3.8, 9.3.11, 9.3.13, 9.4.0–9.4.3, 9.4.7, 9.4.9, 9.4.16, 9.4.17, 9.5.0, 9.5.11, 9.5.13, 10.0.0, 10.0.7, 10.0.9, 10.1.0, 10.1.3, 10.1.5, 10.2.0, 10.3.0, 11.0.0, 11.2.0–11.2.10, 11.3.0–11.3.9, 11.4.0–11.4.8, 11.5.0–11.5.10 from High to Critical</li>
<li>Updated severity ratings for Grafana versions 9.3.2, 9.3.14–9.3.16, 9.4.10, 9.4.12–9.4.15, 9.5.1–9.5.3, 9.5.5–9.5.10, 9.5.12, 9.5.14–9.5.21, 10.0.1–10.0.6, 10.0.8, 10.0.10–10.0.13, 10.1.1–10.1.2, 10.1.4, 10.1.6–10.1.10, 10.2.1–10.2.9, 10.3.1–10.3.12, 10.4.0–10.4.17, 10.4.19, 11.0.1–11.0.11, 11.1.0–11.1.13 from Medium to Critical</li>
<li>Updated severity ratings for Grafana versions 12.0.4, 7.5.16, 7.5.17 from Medium to High</li>
<li>Added vulnerability detection for Apache Traffic Server:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58136">CVE-2025-58136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65114">CVE-2025-65114</a></li>
</ul>
</li>
<li>Added vulnerability detection for Dolibarr:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34036">CVE-2026-34036</a></li>
</ul>
</li>
<li>Added vulnerability detection for Grafana:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27876">CVE-2026-27876</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27877">CVE-2026-27877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27880">CVE-2026-27880</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27879">CVE-2026-27879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28375">CVE-2026-28375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33375">CVE-2026-33375</a></li>
</ul>
</li>
<li>Added vulnerability detection for JBoss EAP:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28368">CVE-2026-28368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28369">CVE-2026-28369</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3121">CVE-2026-3121</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4366">CVE-2026-4366</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4874">CVE-2026-4874</a></li>
</ul>
</li>
<li>Added vulnerability detection for MongoDB:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4358">CVE-2026-4358</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5170">CVE-2026-5170</a></li>
</ul>
</li>
<li>Added vulnerability detection for Pega:<ul>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62184">CVE-2025-62184</a></li>
</ul>
</li>
<li>Added vulnerability detection for PrestaShop:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33673">CVE-2026-33673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33674">CVE-2026-33674</a></li>
</ul>
</li>
<li>Added vulnerability detection for Squid:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33526">CVE-2026-33526</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33515">CVE-2026-33515</a></li>
</ul>
</li>
<li>Added vulnerability detection for handlebars.js:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33937">CVE-2026-33937</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33938">CVE-2026-33938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33939">CVE-2026-33939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33940">CVE-2026-33940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33941">CVE-2026-33941</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33916">CVE-2026-33916</a></li>
</ul>
</li>
<li>Added vulnerability detection for phpMyFAQ:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34974">CVE-2026-34974</a></li>
</ul>
</li>
</ul>
<hr>
<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260331</li>
<li>Updated severity ratings for Ruby on Rails versions 5.2.4.3, 5.2.4.4, 5.2.4.5, 5.2.4.6, 5.2.5, 5.2.6, 5.2.6.2, 6.0.3.1, 6.0.3.2, 6.0.3.3, 6.0.3.4, 6.0.3.5, 6.0.3.6, 6.0.3.7, 6.0.4, 6.0.4.1, 6.0.4.2, 6.0.4.3, 6.0.4.4, 6.0.4.6, 6.0.6.1 from High to Critical</li>
<li>Updated severity rating for Ruby on Rails version 7.0.8.4 from Medium to Critical</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33157">CVE-2026-33157</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33158">CVE-2026-33158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33159">CVE-2026-33159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33160">CVE-2026-33160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33161">CVE-2026-33161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33162">CVE-2026-33162</a></li>
</ul>
</li>
<li>Added vulnerability detection for MediaWiki:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11261">CVE-2025-11261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61641">CVE-2025-61641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61642">CVE-2025-61642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61643">CVE-2025-61643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61646">CVE-2025-61646</a></li>
</ul>
</li>
<li>Added vulnerability detection for OpenCart:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58341">CVE-2024-58341</a></li>
</ul>
</li>
<li>Added vulnerability detection for Ruby on Rails:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33195">CVE-2026-33195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33202">CVE-2026-33202</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33174">CVE-2026-33174</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33176">CVE-2026-33176</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33169">CVE-2026-33169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33170">CVE-2026-33170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33173">CVE-2026-33173</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260324]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260324</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260324</guid>
            <pubDate>Tue, 24 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260324</li>
<li>Updated severity ratings for Craft CMS versions 4.17.0, 4.17.1, 4.17.2, 4.17.3, 5.9.0, 5.9.1, 5.9.2, 5.9.3, 5.9.4, 5.9.5, 5.9.6 from Medium to Critical</li>
<li>Updated severity ratings for LimeSurvey versions 1.72, 1.85, 1.86, 3.19.0, 3.19.1, 3.19.2, 3.19.3, 3.20.0, 3.20.2, 3.21.0, 3.21.1, 3.21.2, 3.21.3, 3.21.4, 3.21.5, 3.21.6, 3.22.0, 3.22.1, 3.22.2, 3.22.3, 3.22.4, 3.22.5, 3.22.6, 3.22.7, 3.22.8, 3.22.9, 3.22.10, 3.22.11, 3.22.12, 3.22.13, 3.22.14, 3.22.15, 3.22.16, 3.22.17, 3.22.18, 3.22.19, 3.22.20, 3.22.21, 3.22.210, 3.22.24, 3.22.25, 3.22.26, 3.22.27, 3.22.28, 3.22.29, 3.23.0, 3.23.1, 3.23.2, 3.23.3, 3.23.4, 3.23.5, 3.23.6, 3.23.7, 3.23.22, 3.23.32, 3.24.0, 3.24.1, 3.24.2, 3.24.3, 3.24.4, 3.24.5, 3.24.6, 3.25.0, 3.25.1, 3.25.2, 3.25.3, 3.25.4, 3.25.5, 3.25.6, 3.25.7, 3.25.8, 3.25.9, 3.25.10, 3.25.11, 3.25.12, 3.25.13, 3.25.14, 3.25.15, 3.25.16, 3.25.17, 3.25.18, 3.25.19, 3.25.20, 3.25.21, 3.25.22, 3.26.0, 3.26.1, 3.26.2, 3.26.3, 3.26.4, 3.26.5, 3.27.0, 3.27.1, 3.27.2, 3.27.3, 3.27.4, 3.27.5, 3.27.6, 3.27.7, 3.27.8, 3.27.9, 3.27.10, 3.27.11, 3.27.12, 3.27.13, 3.27.14, 3.27.16, 3.27.17, 3.27.18, 3.27.19, 3.27.20, 3.27.21, 3.27.22, 3.27.23, 3.27.24, 3.27.25, 3.27.26, 3.27.27, 3.27.28, 3.27.29, 3.27.30, 3.27.31, 3.27.32, 3.27.33, 3.27.34, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.1.7, 4.1.8, 4.1.9, 4.1.10, 4.1.11, 4.1.12, 4.1.13, 4.1.14, 4.1.15, 4.1.16, 4.1.17, 4.1.18, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.2.8, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.3.12, 4.3.13, 4.3.14, 4.3.15, 4.3.16, 4.3.17, 4.3.18, 4.3.19, 4.3.20, 4.3.21, 4.3.22, 4.3.23, 4.3.24, 4.3.25, 4.3.26, 4.3.27, 4.3.28, 4.3.29, 4.3.30, 4.3.31, 4.3.32, 4.3.33, 4.3.34, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.10, 4.4.11, 4.4.12, 4.4.13, 4.4.14, 4.4.15, 4.4.16, 4.5.0, 4.5.1, 4.5.2, 4.6.0, 4.6.1, 4.6.2, 4.6.3, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1.10, 5.1.11, 5.1.12, 5.1.13, 5.1.14, 5.1.15, 5.1.16, 5.1.17, 5.1.18, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.2.10, 5.2.11, 5.2.12, 5.4.4, 6.2.9 from High to Critical</li>
<li>Updated severity ratings for OpenSSL versions 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.6.0 from Critical to High</li>
<li>Added vulnerability detection for CKEditor:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28343">CVE-2026-28343</a></li>
</ul>
</li>
<li>Added vulnerability detection for Chamilo:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28430">CVE-2026-28430</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30875">CVE-2026-30875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30881">CVE-2026-30881</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30876">CVE-2026-30876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30882">CVE-2026-30882</a></li>
</ul>
</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32267">CVE-2026-32267</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31857">CVE-2026-31857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31858">CVE-2026-31858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32263">CVE-2026-32263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32264">CVE-2026-32264</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31859">CVE-2026-31859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32262">CVE-2026-32262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33051">CVE-2026-33051</a></li>
</ul>
</li>
<li>Added vulnerability detection for Jenkins:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33001">CVE-2026-33001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33002">CVE-2026-33002</a></li>
</ul>
</li>
<li>Added vulnerability detection for LimeSurvey:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-56422">CVE-2025-56422</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-56421">CVE-2025-56421</a></li>
</ul>
</li>
<li>Added vulnerability detection for MediaWiki:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61636">CVE-2025-61636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61637">CVE-2025-61637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61638">CVE-2025-61638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61639">CVE-2025-61639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61640">CVE-2025-61640</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61634">CVE-2025-61634</a></li>
</ul>
</li>
<li>Added vulnerability detection for NextJsReactFramework:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27979">CVE-2026-27979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27980">CVE-2026-27980</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27977">CVE-2026-27977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27978">CVE-2026-27978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29057">CVE-2026-29057</a></li>
</ul>
</li>
<li>Added vulnerability detection for TornadoWebServer:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260317]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260317</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260317</guid>
            <pubDate>Tue, 17 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260317</li>
<li>Updated severity ratings for SharePoint versions 16.0.10417.20003, 16.0.18526.20172, 16.0.18526.20286, 16.0.18526.20396, 16.0.18526.20424, 16.0.18526.20508, 16.0.18526.20518, 16.0.19127.20100, 16.0.19127.20262, 16.0.19127.20338, 16.0.19127.20378, 16.0.19127.20442 from High to Critical</li>
<li>Updated severity ratings for Tomcat versions 9.0.109, 10.1.45, 10.1.46, 11.0.11 from Medium to Critical</li>
<li>Updated severity ratings for UndertowWebServer versions 2.0.30, 2.0.31, 2.0.32, 2.0.33, 2.0.34, 2.0.35, 2.0.36, 2.0.39, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.9, 2.2.10, 2.2.11, 2.2.12, 2.2.13, 2.2.14, 2.2.15, 2.2.16, 2.2.17, 2.2.18, 2.2.19 from High to Critical</li>
<li>Added vulnerability detection for CaddyWebServer:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30851">CVE-2026-30851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-30852">CVE-2026-30852</a></li>
</ul>
</li>
<li>Added vulnerability detection for Chamilo:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55208">CVE-2025-55208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55289">CVE-2025-55289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59542">CVE-2025-59542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59543">CVE-2025-59543</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59541">CVE-2025-59541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29041">CVE-2026-29041</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59540">CVE-2025-59540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59544">CVE-2025-59544</a></li>
</ul>
</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29113">CVE-2026-29113</a></li>
</ul>
</li>
<li>Added vulnerability detection for Envoy:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26308">CVE-2026-26308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26310">CVE-2026-26310</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26330">CVE-2026-26330</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26309">CVE-2026-26309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26311">CVE-2026-26311</a></li>
</ul>
</li>
<li>Added vulnerability detection for Jboss EAP:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12543">CVE-2025-12543</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3009">CVE-2026-3009</a></li>
</ul>
</li>
<li>Added vulnerability detection for OpenCart:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3714">CVE-2026-3714</a></li>
</ul>
</li>
<li>Added vulnerability detection for SharePoint:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26105">CVE-2026-26105</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26106">CVE-2026-26106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26113">CVE-2026-26113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26114">CVE-2026-26114</a></li>
</ul>
</li>
<li>Added vulnerability detection for Tomcat:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733</a></li>
</ul>
</li>
<li>Added vulnerability detection for UndertowWebServer:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12543">CVE-2025-12543</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260310]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260310</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260310</guid>
            <pubDate>Tue, 10 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260310</li>
<li>Updated severity ratings for Chamilo versions 1.10.0, 1.10.2, 1.10.4, 1.10.6, 1.10.8, 1.11.26, 1.8.6.1, 1.8.8.3, 1.9.0, 1.9.10, 1.9.10.2, 1.9.10.4, 1.9.6, 1.9.6.1, 1.9.8, 1.9.8.1, 1.9.8.2 from High to Critical</li>
<li>Updated severity rating for Chamilo version 1.11.24 from Medium to Critical</li>
<li>Updated severity ratings for Craft CMS versions 4.15.6.2, 4.16.17, 4.16.18, 4.16.19, 4.4.14, 4.5.6.1, 5.6.16, 5.7.1.1, 5.8.21, 5.8.22, 5.8.23 from High to Critical</li>
<li>Updated severity ratings for DotCMS versions 22.03, 22.03.2, 22.03.4, 22.03.5, 22.03.6, 22.03.7, 22.03.8, 22.03.9, 22.03.10, 22.03.11, 22.03.12, 22.03.13, 22.03.14, 22.03.15, 23.01.1, 23.01.2, 23.01.3, 23.01.4, 23.01.5, 23.01.6, 23.01.7, 23.01.8, 23.01.9, 23.01.10, 23.01.11, 23.01.12, 23.01.13, 23.01.14, 23.01.15, 23.01.16, 23.01.17, 23.10.24.0 from Medium to Critical</li>
<li>Updated severity ratings for EspoCRM versions 2.6.0, 2.7.0, 2.7.1, 2.7.2, 2.8.0, 2.8.1, 2.9.0, 2.9.1, 2.9.2, 3.0.0, 3.0.1, 3.1.0, 3.1.1, 3.2.0, 3.2.1, 3.2.2, 3.3.0, 3.4.0, 3.4.1, 3.4.2, 3.5.0, 3.5.1, 3.5.2, 3.6.0, 3.6.1, 3.6.2, 3.7.0, 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.8.0, 3.9.0, 3.9.1, 3.9.2, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.3.0, 4.3.1, 4.4.0, 4.4.1, 4.5.0, 4.5.1, 4.6.0, 4.7.0, 4.7.1, 4.7.2, 4.8.0, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.5.0, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 5.5.6, 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 5.6.12, 5.6.13, 5.6.14, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.7.10, 5.7.11, 5.8.0, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5 from High to Critical</li>
<li>Updated severity ratings for osCommerce versions 1.0.6.0, 1.0.7.0, 1.0.7.1, 1.0.7.2, 1.0.7.3, 1.0.7.4, 1.0.7.5, 1.0.7.6, 1.0.7.7, 1.0.7.8, 1.0.7.9, 1.1, 1.11, 1.12, 1.13, 2.3, 2.3.1, 2.3.2, 2.3.3, 2.3.3.1, 2.3.3.2, 2.3.3.3, 2.3.3.4, 2.3.4 from Medium to High</li>
<li>Added vulnerability detection for Chamilo:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50187">CVE-2025-50187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50190">CVE-2025-50190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50192">CVE-2025-50192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50199">CVE-2025-50199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52998">CVE-2025-52998</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47886">CVE-2024-47886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50188">CVE-2025-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50189">CVE-2025-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50191">CVE-2025-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50193">CVE-2025-50193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50194">CVE-2025-50194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50195">CVE-2025-50195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50196">CVE-2025-50196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50197">CVE-2025-50197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52469">CVE-2025-52469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52482">CVE-2025-52482</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50337">CVE-2024-50337</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50186">CVE-2025-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50198">CVE-2025-50198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52468">CVE-2025-52468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52470">CVE-2025-52470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52475">CVE-2025-52475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52476">CVE-2025-52476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52563">CVE-2025-52563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52564">CVE-2025-52564</a></li>
</ul>
</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28697">CVE-2026-28697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28783">CVE-2026-28783</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28695">CVE-2026-28695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28696">CVE-2026-28696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28784">CVE-2026-28784</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27129">CVE-2026-27129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28781">CVE-2026-28781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28782">CVE-2026-28782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29069">CVE-2026-29069</a></li>
</ul>
</li>
<li>Added vulnerability detection for DOMPurify:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15599">CVE-2025-15599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0540">CVE-2026-0540</a></li>
</ul>
</li>
<li>Added vulnerability detection for Django:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25673">CVE-2026-25673</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25674">CVE-2026-25674</a></li>
</ul>
</li>
<li>Added vulnerability detection for DotCMS:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11165">CVE-2025-11165</a></li>
</ul>
</li>
<li>Added vulnerability detection for EspoCRM:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-37094">CVE-2020-37094</a></li>
</ul>
</li>
<li>Added vulnerability detection for Jetty:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1605">CVE-2026-1605</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11143">CVE-2025-11143</a></li>
</ul>
</li>
<li>Added vulnerability detection for MediaWiki:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61645">CVE-2025-61645</a></li>
</ul>
</li>
<li>Added vulnerability detection for Moodle:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67847">CVE-2025-67847</a></li>
</ul>
</li>
<li>Added vulnerability detection for Underscore.js:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27601">CVE-2026-27601</a></li>
</ul>
</li>
<li>Added vulnerability detection for Werkzeug:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27199">CVE-2026-27199</a></li>
</ul>
</li>
<li>Added vulnerability detection for XWikiplatform:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55749">CVE-2025-55749</a></li>
</ul>
</li>
<li>Added vulnerability detection for osCommerce:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25495">CVE-2019-25495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25496">CVE-2019-25496</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25497">CVE-2019-25497</a></li>
</ul>
</li>
<li>Added vulnerability detection for phpMyFAQ:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27836">CVE-2026-27836</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260303]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260303</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260303</guid>
            <pubDate>Tue, 03 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260303</li>
<li>Updated severity ratings for CaddyWebServer versions 0.10.3, 0.10.4, 0.10.5, 0.10.6, 0.10.7, 0.10.8, 0.10.9, 0.10.10, 0.10.11, 0.10.12, 0.10.13, 0.10.14, 0.11.0, 0.11.1, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 2.0.0, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.3, 2.3.0, 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4 from High to Critical</li>
<li>Updated severity rating for Grafana version 10.4.0 from Low to Medium</li>
<li>Updated severity rating for Markdownit version 14.1.0 from Medium to High</li>
<li>Updated severity ratings for Moodle versions 4.2.10, 4.2.11 from Medium to High</li>
<li>Updated severity ratings for Piwigo versions 14.0.0, 14.1.0, 14.2.0, 14.3.0, 14.4.0 from Medium to High</li>
<li>Added vulnerability detection for Angular:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22610">CVE-2026-22610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27970">CVE-2026-27970</a></li>
</ul>
</li>
<li>Added vulnerability detection for CKEditor:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21254">CVE-2021-21254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45613">CVE-2024-45613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61261">CVE-2025-61261</a></li>
</ul>
</li>
<li>Added vulnerability detection for CaddyWebServer:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27586">CVE-2026-27586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27587">CVE-2026-27587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27588">CVE-2026-27588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27590">CVE-2026-27590</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27585">CVE-2026-27585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27589">CVE-2026-27589</a></li>
</ul>
</li>
<li>Added vulnerability detection for CakePHP:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23643">CVE-2026-23643</a></li>
</ul>
</li>
<li>Added vulnerability detection for Chamilo:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1106">CVE-2026-1106</a></li>
</ul>
</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27126">CVE-2026-27126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27127">CVE-2026-27127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27128">CVE-2026-27128</a></li>
</ul>
</li>
<li>Added vulnerability detection for Dolibarr:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25450">CVE-2019-25450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25452">CVE-2019-25452</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-47779">CVE-2021-47779</a></li>
</ul>
</li>
<li>Added vulnerability detection for Grafana:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41117">CVE-2025-41117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21722">CVE-2026-21722</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21725">CVE-2026-21725</a></li>
</ul>
</li>
<li>Added vulnerability detection for Markdownit:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2327">CVE-2026-2327</a></li>
</ul>
</li>
<li>Added vulnerability detection for MongoDb:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1847">CVE-2026-1847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1848">CVE-2026-1848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1849">CVE-2026-1849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1850">CVE-2026-1850</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25609">CVE-2026-25609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25610">CVE-2026-25610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25613">CVE-2026-25613</a></li>
</ul>
</li>
<li>Added vulnerability detection for Moodle:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26045">CVE-2026-26045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26046">CVE-2026-26046</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26047">CVE-2026-26047</a></li>
</ul>
</li>
<li>Added vulnerability detection for NextJsReactFramework:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59472">CVE-2025-59472</a></li>
</ul>
</li>
<li>Added vulnerability detection for Piwigo:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48928">CVE-2024-48928</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62512">CVE-2025-62512</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260224]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260224</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260224</guid>
            <pubDate>Tue, 24 Feb 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260224</li>
<li>Updated severity ratings for PostgreSQL versions 14.13, 15.8, 16.4, 17.0 from Medium to High</li>
<li>Added vulnerability detection for Angular:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66412">CVE-2025-66412</a></li>
</ul>
</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25495">CVE-2026-25495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25497">CVE-2026-25497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25498">CVE-2026-25498</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25491">CVE-2026-25491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25492">CVE-2026-25492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25493">CVE-2026-25493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25494">CVE-2026-25494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25496">CVE-2026-25496</a></li>
</ul>
</li>
<li>Added vulnerability detection for Grafana:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21720">CVE-2026-21720</a></li>
</ul>
</li>
<li>Added vulnerability detection for Hiawatha:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57783">CVE-2025-57783</a></li>
<li>Low: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57784">CVE-2025-57784</a></li>
</ul>
</li>
<li>Added vulnerability detection for Jenkins:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27099">CVE-2026-27099</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27100">CVE-2026-27100</a></li>
</ul>
</li>
<li>Added vulnerability detection for Lodash:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465</a></li>
</ul>
</li>
<li>Added vulnerability detection for NextJsReactFramework:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59471">CVE-2025-59471</a></li>
</ul>
</li>
<li>Added vulnerability detection for PostgreSQL:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2007">CVE-2026-2007</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003</a></li>
</ul>
</li>
<li>Added vulnerability detection for PrestaShop:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25597">CVE-2026-25597</a></li>
</ul>
</li>
<li>Added vulnerability detection for React:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864">CVE-2026-23864</a></li>
</ul>
</li>
<li>Added vulnerability detection for Skipper:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23742">CVE-2026-23742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24470">CVE-2026-24470</a></li>
</ul>
</li>
<li>Added vulnerability detection for XWikiplatform:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66472">CVE-2025-66472</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26000">CVE-2026-26000</a></li>
</ul>
</li>
<li>Added vulnerability detection for axios:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25639">CVE-2026-25639</a></li>
</ul>
</li>
<li>Removed vulnerability detection for bootstrap.js:<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6531">CVE-2024-6531</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260219]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260219</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260219</guid>
            <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260219</li>
<li>Updated severity ratings for Moodle versions 3.9.24, 3.10.11, 3.11.17, 3.11.18, 4.0.11, 4.0.12, 4.1.16, 4.1.17, 4.1.18, 4.1.19, 4.1.20, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.10, 4.5.2, 4.5.3, 4.5.4, 4.5.5, 4.5.6, 5.0.0, 5.0.1, 5.0.2 from High to Critical</li>
<li>Updated severity ratings for OpenSSL versions 1.0.2zh, 1.0.2zi, 1.1.1w from Medium to High</li>
<li>Updated severity ratings for OpenSSL versions 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.3.0, 3.3.1, 3.5.0 from High to Critical</li>
<li>Updated severity ratings for Roundcube versions 1.5.6, 1.6.5, 1.6.6 from High to Critical</li>
<li>Updated severity ratings for moveittransfer versions 2022.0.0, 2022.0.4, 2022.0.5, 2022.0.6, 2022.0.7, 2022.0.8, 2022.0.9, 2022.1.0, 2022.1.5, 2022.1.6, 2022.1.7, 2022.1.8, 2022.1.9, 2022.1.10 from Medium to High</li>
<li>Added vulnerability detection for Chamilo:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69581">CVE-2025-69581</a></li>
</ul>
</li>
<li>Added vulnerability detection for CrushFTP:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-63420">CVE-2025-63420</a></li>
</ul>
</li>
<li>Added vulnerability detection for Django:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1285">CVE-2026-1285</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13473">CVE-2025-13473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1207">CVE-2026-1207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1287">CVE-2026-1287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1312">CVE-2026-1312</a></li>
</ul>
</li>
<li>Added vulnerability detection for Moodle:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67856">CVE-2025-67856</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67848">CVE-2025-67848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67851">CVE-2025-67851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67853">CVE-2025-67853</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67849">CVE-2025-67849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67850">CVE-2025-67850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67852">CVE-2025-67852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67855">CVE-2025-67855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67857">CVE-2025-67857</a></li>
</ul>
</li>
<li>Added vulnerability detection for OpenSSL:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796</a></li>
</ul>
</li>
<li>Added vulnerability detection for PodcastGenerator:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70336">CVE-2025-70336</a></li>
</ul>
</li>
<li>Added vulnerability detection for Python:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12781">CVE-2025-12781</a></li>
</ul>
</li>
<li>Added vulnerability detection for Roundcube:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37385">CVE-2024-37385</a></li>
</ul>
</li>
<li>Added vulnerability detection for SharePoint:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21260">CVE-2026-21260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21511">CVE-2026-21511</a></li>
</ul>
</li>
<li>Added vulnerability detection for WebERP:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-37082">CVE-2020-37082</a></li>
</ul>
</li>
<li>Added vulnerability detection for Werkzeug:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21860">CVE-2026-21860</a></li>
</ul>
</li>
<li>Added vulnerability detection for XWikiplatform:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24128">CVE-2026-24128</a></li>
</ul>
</li>
<li>Added vulnerability detection for advanced-custom-fields:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20986">CVE-2018-20986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-24241">CVE-2021-24241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6701">CVE-2023-6701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40068">CVE-2023-40068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4565">CVE-2024-4565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9529">CVE-2024-9529</a></li>
</ul>
</li>
<li>Added vulnerability detection for moveittransfer:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11235">CVE-2025-11235</a></li>
</ul>
</li>
<li>Added vulnerability detection for wordpresspluginacf-extended:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14533">CVE-2025-14533</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260203]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260203</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260203</guid>
            <pubDate>Tue, 03 Feb 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<p><em>Version: 25.12.9</em></p>
<h4>Security checks</h4>
<ul>
<li>Added comprehensive JWT authentication bypass detection<ul>
<li>High: JWT Signature Bypass via None Algorithm</li>
<li>High: JWT Signature is not Verified</li>
<li>High: JWT Signature Bypass via kid SQL injection</li>
<li>High: JWT Signature Bypass via kid Path Traversal</li>
<li>High: JWT Signature Bypass via unvalidated jwk parameter</li>
<li>High: Unvalidated JWT jku parameter</li>
<li>High: Unvalidated JWT x5u parameter</li>
<li>High: JWT Signature Bypass via unvalidated jku parameter</li>
<li>High: JWT Signature Bypass via unvalidated x5u parameter</li>
<li>High: JWT Signature Bypass via unvalidated x5c parameter</li>
</ul>
</li>
<li>Added authorization vulnerability detection<ul>
<li>High: Horizontal Broken Function Level Authorization (BFLA)</li>
<li>High: Unauthenticated Access to Sensitive Functions</li>
<li>High: Horizontal IDOR/BOLA (Broken Object Level Authorization)</li>
<li>High: Vertical Broken Function Level Authorization (BFLA)</li>
<li>High: Vertical IDOR/BOLA (Broken Object Level Authorization)</li>
</ul>
</li>
<li>Added sensitive information exposure detection<ul>
<li>High: API Sensitive Info(PII) accessible without authentication</li>
<li>Medium: Resource Accessible Without Required Authentication</li>
</ul>
</li>
<li>Added API inventory management checks<ul>
<li>Medium: API Authentication Bypass Using a Test/Staging Host Header</li>
</ul>
</li>
<li>Added microservice security checks<ul>
<li>High: Microservice Directory Traversal</li>
</ul>
</li>
<li>Added vulnerability detection for Java:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945</a></li>
</ul>
</li>
<li>Added vulnerability detection for Jetty:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115">CVE-2025-5115</a></li>
</ul>
</li>
<li>Added vulnerability detection for Joomla:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-63082">CVE-2025-63082</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-63083">CVE-2025-63083</a></li>
</ul>
</li>
<li>Removed vulnerability detection for LiferayPortal:<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33944">CVE-2023-33944</a></li>
</ul>
</li>
<li>Added vulnerability detection for LimeSurvey:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36993">CVE-2020-36993</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39063">CVE-2024-39063</a></li>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41375">CVE-2025-41375</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41376">CVE-2025-41376</a></li>
</ul>
</li>
<li>Added vulnerability detection for MySQL:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964</a></li>
</ul>
</li>
<li>Added vulnerability detection for Oracle:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21939">CVE-2026-21939</a></li>
</ul>
</li>
<li>Added vulnerability detection for Oracle HTTP Server:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21962">CVE-2026-21962</a></li>
</ul>
</li>
<li>Added vulnerability detection for osTicket:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22200">CVE-2026-22200</a></li>
</ul>
</li>
<li>Added vulnerability detection for phpMyFAQ:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24420">CVE-2026-24420</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24421">CVE-2026-24421</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24422">CVE-2026-24422</a></li>
</ul>
</li>
<li>Updated severity for Oracle 23.8 from Medium to High</li>
<li>Updated severity for osTicket 1.17, 1.17.1, 1.17.3, 1.17.4, 1.17.5, 1.17.6, 1.18 from Medium to High</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260127]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260127</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260127</guid>
            <pubDate>Tue, 27 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<p><em>Version: 25.12.8</em></p>
<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260127</li>
<li>Added vulnerability detection for e107:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50939">CVE-2022-50939</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50905">CVE-2022-50905</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260120]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260120</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260120</guid>
            <pubDate>Tue, 20 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<p><em>Version: 25.12.7</em></p>
<h4>Security checks</h4>
<ul>
<li>Updated the vulnerability database (VDB) to version 20260120</li>
<li>Updated severity rating for Craft CMS version 3.9.15 from Medium to Critical</li>
<li>Updated severity ratings for Craft CMS versions 4.4.16, 4.4.16.1, 4.4.17, 4.5.0, 4.14.9, 4.14.10, 4.14.11, 4.14.11.1, 4.14.12, 4.14.13, 4.14.14, 4.14.15, 4.15.0, 4.15.0.1, 4.15.0.2, 4.15.1, 4.15.2, 4.15.3, 4.15.4, 4.15.5, 4.15.6, 4.15.6.1, 5.6.10, 5.6.10.1, 5.6.10.2, 5.6.11, 5.6.12, 5.6.13, 5.6.14, 5.6.15, 5.6.17, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.8.1, 5.7.8.2 from High to Critical</li>
<li>Updated severity rating for Grafana version 12.0.0 from High to Critical</li>
<li>Updated severity ratings for e107 versions 2.1.4, 2.3.2 from Medium to High</li>
<li>Added vulnerability detection for Craft CMS:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68456">CVE-2025-68456</a></li>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68454">CVE-2025-68454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68455">CVE-2025-68455</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68436">CVE-2025-68436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68437">CVE-2025-68437</a></li>
</ul>
</li>
<li>Added vulnerability detection for Grafana:<ul>
<li>Critical: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41115">CVE-2025-41115</a></li>
</ul>
</li>
<li>Added vulnerability detection for Python:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837</a></li>
</ul>
</li>
<li>Added vulnerability detection for SharePoint:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20943">CVE-2026-20943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20947">CVE-2026-20947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20948">CVE-2026-20948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20951">CVE-2026-20951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20963">CVE-2026-20963</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20958">CVE-2026-20958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20959">CVE-2026-20959</a></li>
</ul>
</li>
<li>Added vulnerability detection for e107:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50907">CVE-2022-50907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50916">CVE-2022-50916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11941">CVE-2025-11941</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50906">CVE-2022-50906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61505">CVE-2025-61505</a></li>
</ul>
</li>
<li>Added vulnerability detection for typo3CMS:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59022">CVE-2025-59022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0859">CVE-2026-0859</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59020">CVE-2025-59020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59021">CVE-2025-59021</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Release v20260112]]></title>
            <link>https://docs.invicti.com/ie-is/security-releases#release-v20260112</link>
            <guid isPermaLink="false">https://docs.invicti.com/ie-is/security-releases#20260112</guid>
            <pubDate>Mon, 12 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Track new security checks, vulnerability detection capabilities, and Runtime SCA findings added to Invicti Enterprise and Invicti Standard with each release.]]></description>
            <content:encoded><![CDATA[<p><em>Version: 25.12.6</em></p>
<h4>Security checks</h4>
<ul>
<li>Added vulnerability detection for OpenCart:<ul>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15116">CVE-2025-15116</a></li>
</ul>
</li>
<li>Added vulnerability detection for PHP:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180</a></li>
</ul>
</li>
<li>Added vulnerability detection for WordPress:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31210">CVE-2024-31210</a></li>
</ul>
</li>
<li>Added vulnerability detection for phpMyFAQ:<ul>
<li>High: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62519">CVE-2025-62519</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69200">CVE-2025-69200</a></li>
<li>Medium: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68951">CVE-2025-68951</a></li>
</ul>
</li>
</ul>
<hr>
]]></content:encoded>
        </item>
    </channel>
</rss>