A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / current-activity

current-activity

TZCERT-SU-24-0290 (ZDI Security Update)

Zero Day Initiative has released security updates to address vulnerabilities in Microsoft Office, Skype, Adobe Premier Pro and Adobe Bridge. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review ZDI Security Advisories ZDI-24-294, ZDI-24-293, ZDI-24-292 and ZDI-24-291 and …

Read More »

TZCERT-SU-24-0289 (Red Hat Security Update)

Red Hat has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories RHSA-2024:1323, RHSA-2024:1315, RHSA-2024:1306, RHSA-2024:1270 and RHSA-2024:1305 and apply necessary updates.

Read More »

TZCERT-SU-24-0288 (Bosch Security Update)

Bosch has released security updates to address vulnerabilities in Bosch Remote Programing Software, Bosch BVMS and Bosch DIVAR IP. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Bosch Security Advisories bosch-sa-099637-bt and bosch-sa-246962-bt and apply necessary updates.

Read More »

TZCERT-SU-24-0287 (WordPress Security Update)

Wordfence has released security updates to address vulnerabilities in Malware Scanner, Hustle, weForms, Post Grid Combo and Bulgarisation for WooCommerce. Exploitation of these vulnerabilities may allow an attacker to gain escalated privilege. Users and administrators are encouraged to review Wordfence Security Advisories malware-scanner, hustle, weforms, post-grid and bulgarisation-for-woocommerce and apply …

Read More »

TZCERT-SU-24-0286 (SUSE Security Update)

SUSE has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review SUSE Security Advisories dated 13th March 2024 and apply necessary updates.

Read More »

TZCERT-SU-24-0285 (Cisco Security Update)

Cisco has released security updates to address vulnerabilities in Cisco IOS XR, Cisco SD-WAN vManage and Cisco Secure Client. Exploitation of these vulnerabilities may allow an attacker to gain escalated privilege. Users and administrators are encouraged to review Cisco Security Advisories cisco-sa-xrl2vpn, cisco-sa-iosxr-ssh-privesc, cisco-sa-iosxr-pppma, cisco-sa-vmanage-unauthapi and cisco-sa-secure-client-crlf and apply necessary …

Read More »

TZCERT-SU-24-0284 (Slackware Security Update)

Slackware has released security update to address a vulnerability in expat. Exploitation of this vulnerability may allow an attacker to gain access to sensitive information. Users and administrators are encouraged to review Slackware Security Advisory and apply necessary updates.

Read More »

TZCERT-SU-24-0283 (Ubuntu Security Update)

Ubuntu has released security updates to address vulnerabilities in rack, PostgreSQL, open vSwitch, Linux kernel, gson, .NET and OpenSSL. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Ubuntu Security Advisories USN-6689-1, USN-6656-2, USN-6690-1, LSN-0101-1, USN-6692-1, USN-6693-1 and …

Read More »

TZCERT-SU-24-0282 (Insyde Security Update)

Insyde has released security updates to address a vulnerability in IhisiServiceSmm module. Exploitation of this vulnerability may allow an attacker to modify UEFI variables. Users and administrators are encouraged to review Insyde Security Advisory and apply necessary updates.

Read More »

TZCERT-SU-24-0281 (Palo Alto Security Update)

Palo Alto Networks has released security updates to address vulnerabilities in GlobalProtect App and PAN-OS. Exploitation of these vulnerabilities may allow an attacker to gain escalated privilege. Users and administrators are encouraged to review Palo Alto Networks Security Advisories CVE-2024-2431, CVE-2024-2432 and CVE-2024-2433 and apply necessary updates.

Read More »