vulnerability in rootio-cryptography (ROOT-APP-PYPI-CVE-2026-34073). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `46.0.4+root.io.2, 46.0.5+root.io.2, 45.0.5+root.io.3, 46.0.3+root.io.3, 45.0.5+root.io.4` or later.
vulnerability in rootio-cryptography (ROOT-APP-PYPI-CVE-2026-39892). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `46.0.4+root.io.2, 46.0.5+root.io.1, 45.0.5+root.io.2, 46.0.5+root.io.2, 45.0.5+root.io.3, 46.0.3+root.io.2, 46.0.3+root.io.3, 45.0.5+root.io.4` or later.