Apple has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Apple Security Advisories dated 20th July 2022 and apply necessary updates.
Read More »Oracle Linux Security Update
Oracle has released security updates to address vulnerabilities in java. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Oracle Security Advisories ELSA-2022-5683 and ELSA-2022-5687 and apply necessary updates.
Read More »HP Security Update
Hewlett Packard has released security updates to address vulnerabilities in Aruba Products, HP PC UEFI Security Boot and HP Jumpstart software. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review HP Security Advisories hpesbnw04308, hpesbnw04285, hpsbhf03799 and hpsbhf03791 and apply …
Read More »SUSE Security Update
SUSE has released security updates to address vulnerabilities in rubygem-rack and webkit2gth3. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review SUSE Security Advisories suse-su-20222526-1 and suse-su-20222525-1 and apply necessary updates.
Read More »Cisco Security Update
Cisco has released security updates to address vulnerabilities in Cisco Nexus Dashboard, Cisco Small Business and Cisco IoT Control Center. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Cisco Security Advisories cisco-sa-ndb, cisco-sa-sb-rv and cisco-sa-iotcc and apply necessary updates.
Read More »Red Hat Security Update
Red Hat has released security updates to address vulnerabilities in java, kernel and grub. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories RHSA-2022:5687 and RHSA-2022:5678 and apply necessary updates.
Read More »IBM Security Update
IBM has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review IBM Security Advisories dated 21st July 2022 and apply necessary updates.
Read More »Dell Security Update
Dell has released security updates to address vulnerabilities in Dell Disk Library and Dell VNX2. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Dell Security Advisories dsa-2022-072 and dsa-2021-164 and apply necessary updates.
Read More »NetApp Security Update
NetApp has released security update to address a vulnerability in Ruby Gem. Exploitation of this vulnerability may allow an attacker to take control of affected system. Users and administrators are encouraged to review NetApp Security Advisory and apply necessary updates.
Read More »Oracle Security Update
Oracle has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Oracle Security Advisories cpujul2022, bulletinjul2022, linuxbulletinjul2022 and ovmbulletinjul2022 and apply necessary updates.
Read More »