A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / current-activity (page 45)

current-activity

TZCERT-SU-24-0015 (HP Security Update)

Hewlett-Packard has released security updates to address vulnerabilities in HPE UOCAM and Intel Virtual RAID. Exploitation of these vulnerabilities may allow an attacker to gain escalated privilege. Users and administrators are encouraged to review HP Security Advisories hpesbgn04570 and hpsbhf03862 and apply necessary updates.

Read More »

TZCERT-SU-24-0014 (SUSE Security Update)

SUSE has released security updates to address vulnerabilities in libcryptopp, webkit2gtk3, postfix and w3m. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review SUSE Security Advisories suse-su-20240030-1, suse-su-20240004-1, suse-su-20240012-1 and suse-su-20240014-1 and apply necessary updates.

Read More »

TZCERT-SU-24-0013 (Chrome Security Update)

Google has released security updates to address vulnerabilities in Chrome for android and Chrome for Desktop. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Chrome Security Advisories chrome-for-android and chrome-for-desktop and apply necessary updates.

Read More »

TZCERT-SU-24-0012 (Android Security Update)

Google has released security updates to address vulnerabilities in android OS. Exploitation of these vulnerabilities may allow an attacker to escalated privilege. Users and administrators are encouraged to review Android Security Advisory and apply necessary updates.

Read More »

TZCERT-SU-24-0011 (F5 Security Update)

F5 has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to cause a denial of service condition. Users and administrators are encouraged to review F5 Security Advisories K64119434, K64292204, K64829234, K66510514, K66544153, K16852653, K67090077, K67416037 and K11010341 and apply necessary …

Read More »

TZCERT-SU-24-0010 (Oracle Linux Security Update)

Oracle has released security updates to address vulnerabilities in firefox, tigervnc, thunderbird, gstreamer-plugins and xorg-x11. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Oracle Linux Security Advisories ELSA-2024-0025, ELSA-2024-0010, ELSA-2024-0003, ELSA-2024-0013 and ELSA-2024-0009 and apply necessary updates.

Read More »

TZCERT-SU-24-0009 (WordPress Security Update)

Wordfence has released security updates to address vulnerabilities in WP Compress, ARForms, LearnPress and DSGVO Compliant. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Wordfence Security Advisories wp-compress, arforms, learnpress-4257, learnpress-4257-un and omgf-gdprdsgvo-compliant and apply necessary updates.

Read More »

TZCERT-SU-24-0008 (Gentoo Linux Security Update)

Gentoo has released security update to address a vulnerability in joblib. Exploitation of this vulnerability may allow an attacker to take control of affected system. Users and administrators are encouraged to review Gentoo Security Advisory and apply necessary updates.

Read More »

TZCERT-SU-24-0007 (Wireshark Security Update)

Wireshark has released security updates to address vulnerabilities in Wireshark. Exploitation of these vulnerabilities may allow an attacker to make Wireshark crash. Users and administrators are encouraged to review Wireshark Security Advisories wnpa-sec-2024-05, wnpa-sec-2024-04, wnpa-sec-2024-03, wnpa-sec-2024-02 and wnpa-sec-2024-01 and apply necessary updates.

Read More »

TZCERT-SU-24-0006 (Red Hat Security Update)

Red Hat has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories and apply necessary updates.

Read More »