Red Hat has released security updates to address vulnerabilities in Red Hat Linux Enterprises. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review RHSA-2022:0155, RHSA-2022:0152 and RHSA-2022:0151 and apply necessary updates.
Read More »Debian Security Update
Debian has released security updates to address vulnerabilities in Debian Linux Enterprise. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Debian Security Advisories DSA-5048-1 and DSA-5047-1 and apply necessary updates.
Read More »Oracle Security Update
Oracle has released security updates to address security vulnerabilities in Oracle Linux Os. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Oracle Security Advisories of 18th January 2022 and apply necessary updates.
Read More »Juniper Security Update
Juniper has released security updates to address vulnerabilities affecting its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Juniper Security Advisory and apply necessary updates.
Read More »SUSE Security Update
SUSE has released security updates to address vulnerabilities affecting SUSE Linux Enterprise. Exploitation of these vulnerabilities may allow an attackers to take control of an affected system. Users and Administrators are encouraged to review SUSE Security Advisory SUSE-SU-2022:0088-1, SUSE-SU-2022:0090-1 and SUSE-SU-2022:0091-1 and apply necessary updates.
Read More »Apple Security Update
Apple has released security updates to address a vulnerability in iOS and iPadOS. Exploitation of this vulnerability may allow an attacker to cause a denial of service condition. Users and administrators are encouraged to review Apple Security Advisory and apply necessary updates.
Read More »Microsoft Security Update
Microsoft has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Microsoft Security Advisory and apply necessary updates.
Read More »Red Hat Security Update
Red Hat has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories dated 12th January 2022 and apply necessary updates.
Read More »Huawei Security Update
Huawei has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Huawei Security Advisories huawei-sa-20211215-01, huawei-sa-20160706-01 and huawei-sa-20160330-01 and apply necessary updates.
Read More »Palo Alto Security Update
Palo Alto has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to gain elevated privilege. Users and administrators are encouraged to review Palo Alto Security Advisories CVE-2022-0015, CVE-2022-0014, CVE-2022-0013 and CVE-2022-0012 and apply necessary updates.
Read More »