F5 has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review F5 Security Advisories K40084114 and K68755210 and apply necessary updates.
Read More »NetApp Security Update
NetApp has released security updates to address a vulnerability in H2 database. Exploitation of this vulnerability may allow an attacker to take control of affected system. Users and administrators are encouraged to review NetApp Security Advisory and apply necessary updates.
Read More »IBM Security Update
IBM has released security update to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review IBM Security Advisories and apply necessary updates.
Read More »Amazon Linux Security Update
Amazon has released security updates to address vulnerabilities in log4j. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Amazon Linux Security Advisory and apply necessary updates.
Read More »Ubuntu Security Update
Ubuntu has released security updates to address vulnerabilities in Pillow. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Ubuntu Security Notice and apply necessary updates.
Read More »Dell Security Update
Dell has released security updates to address vulnerabilities in Dell Storage Manager, Product Security Information. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Dell Security Advisory and apply necessary updates.
Read More »Red Hat Security Update
Red Hat has released security updates to address vulnerabilities in Red Hat Linux Enterprises. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review RHSA-2022:0155, RHSA-2022:0152 and RHSA-2022:0151 and apply necessary updates.
Read More »Debian Security Update
Debian has released security updates to address vulnerabilities in Debian Linux Enterprise. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Debian Security Advisories DSA-5048-1 and DSA-5047-1 and apply necessary updates.
Read More »Oracle Security Update
Oracle has released security updates to address security vulnerabilities in Oracle Linux Os. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Oracle Security Advisories of 18th January 2022 and apply necessary updates.
Read More »Juniper Security Update
Juniper has released security updates to address vulnerabilities affecting its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Juniper Security Advisory and apply necessary updates.
Read More »