{
  "feed": {
    "id": "csaf-feed-tlp-white",
    "title": "CSAF feed (TLP:WHITE)",
    "link": [
      {
        "rel": "self",
        "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/csaf-feed-tlp-white.json"
      },
      {
        "rel": "service",
        "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/service.json"
      }
    ],
    "category": [
      {
        "scheme": "urn:ietf:params:rolie:category:information-type",
        "term": "csaf"
      }
    ],
    "updated": "2026-04-23T12:43:40Z",
    "entry": [
      {
        "id": "PPSA-2026-002",
        "title": "Pilz: Vulnerability affecting PASvisu Runtime",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json.asc"
          }
        ],
        "published": "2026-04-23T12:00:00Z",
        "updated": "2026-04-23T12:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "PPSA-2026-001",
        "title": "Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-001.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-001.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-001.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-001.json.asc"
          }
        ],
        "published": "2026-02-02T08:00:00Z",
        "updated": "2026-02-02T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-001.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "PPSA-2025-004",
        "title": "Pilz: Vulnerability affecting PASvisu Runtime",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-004.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-004.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-004.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-004.json.asc"
          }
        ],
        "published": "2025-10-20T10:00:00Z",
        "updated": "2025-10-20T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-004.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "PPSA-2025-002",
        "title": "Pilz: Missing Authentication in Node-RED integration",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json.asc"
          }
        ],
        "published": "2025-07-01T10:00:00Z",
        "updated": "2025-07-01T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "PPSA-2025-003",
        "title": "Pilz: Authentication Bypass in IndustrialPI Webstatus",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json.asc"
          }
        ],
        "published": "2025-07-01T10:00:00Z",
        "updated": "2025-07-01T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "PPSA-2025-001",
        "title": "Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json.asc"
          }
        ],
        "published": "2025-06-30T10:00:00Z",
        "updated": "2025-06-30T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2022-044",
        "title": "Pilz: Multiple products affected by ZipSlip",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-044.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-044.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-044.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-044.json.asc"
          }
        ],
        "published": "2022-11-24T09:00:00Z",
        "updated": "2025-06-05T13:28:13Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-044.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2023-048",
        "title": "Pilz: Multiple products prone to libwebp vulnerability",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-048.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-048.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-048.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-048.json.asc"
          }
        ],
        "published": "2023-12-05T07:00:00Z",
        "updated": "2025-05-22T13:03:10Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-048.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2022-045",
        "title": "Pilz: PAS 4000 prone to ZipSlip",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-045.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-045.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-045.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-045.json.asc"
          }
        ],
        "published": "2022-11-24T09:00:00Z",
        "updated": "2025-05-22T13:03:10Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-045.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2023-033",
        "title": "Pilz: WIBU Vulnerabilitiy in multiple Products",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-033.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-033.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-033.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-033.json.asc"
          }
        ],
        "published": "2023-10-12T06:00:00Z",
        "updated": "2025-05-22T13:03:10Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-033.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2021-009",
        "title": "Pilz: Multiple products prone to Niche Ethernet Stack vulnerabilities",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-009.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-009.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-009.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-009.json.asc"
          }
        ],
        "published": "2021-09-20T11:56:00Z",
        "updated": "2025-05-14T13:00:14Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-009.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2020-033",
        "title": "Pilz: Multiple products prone to WIBU-SYSTEMS CodeMeter vulnerabilities",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-033.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-033.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-033.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-033.json.asc"
          }
        ],
        "published": "2020-09-10T13:18:00Z",
        "updated": "2025-05-14T12:28:19Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-033.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2023-050",
        "title": "Pilz: Vulnerability in PASvisu and PMI v8xx",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2023-050.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2023-050.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2023-050.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2023-050.json.asc"
          }
        ],
        "published": "2024-01-30T07:00:00Z",
        "updated": "2025-04-10T13:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2023-050.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2024-002",
        "title": "Pilz: Multiple products affected by uC/HTTP vulnerability",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-002.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-002.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-002.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-002.json.asc"
          }
        ],
        "published": "2024-02-06T07:00:00Z",
        "updated": "2024-02-06T07:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-002.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2023-059",
        "title": "Pilz: Electron Vulnerabilities in PASvisu and PMI v8xx",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-059.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-059.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-059.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-059.json.asc"
          }
        ],
        "published": "2023-12-05T07:06:00Z",
        "updated": "2023-12-05T07:06:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-059.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2022-033",
        "title": "Pilz: PASvisu and PMI affected by multiple vulnerabilities",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-033.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-033.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-033.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-033.json.asc"
          }
        ],
        "published": "2022-11-24T09:00:00Z",
        "updated": "2022-11-24T09:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-033.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2021-061",
        "title": "Pilz: PMC programming tool 3.x.x affected by multiple vulnerabilities",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-061.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-061.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-061.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-061.json.asc"
          }
        ],
        "published": "2022-04-26T10:00:00Z",
        "updated": "2022-04-26T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-061.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2021-054",
        "title": "Pilz: Multiple vulnerabilities in CODESYS V2 and V3 runtime system",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-054.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-054.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-054.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-054.json.asc"
          }
        ],
        "published": "2022-04-26T10:00:00Z",
        "updated": "2022-04-26T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-054.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      },
      {
        "id": "VDE-2021-055",
        "title": "Pilz: PMC programming tool 2.x.x affected by multiple vulnerabilities",
        "link": [
          {
            "rel": "self",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-055.json"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-055.json.sha256"
          },
          {
            "rel": "hash",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-055.json.sha512"
          },
          {
            "rel": "signature",
            "href": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-055.json.asc"
          }
        ],
        "published": "2022-04-26T10:00:00Z",
        "updated": "2022-04-26T10:00:00Z",
        "content": {
          "type": "application/json",
          "src": "https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-055.json"
        },
        "format": {
          "schema": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf_json_schema.json",
          "version": "2.0"
        }
      }
    ]
  }
}
