A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Current Activities

TZCERT-SU-24-0010 (Oracle Linux Security Update)

Oracle has released security updates to address vulnerabilities in firefox, tigervnc, thunderbird, gstreamer-plugins and xorg-x11. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Oracle Linux Security Advisories ELSA-2024-0025, ELSA-2024-0010, ELSA-2024-0003, ELSA-2024-0013 and ELSA-2024-0009 and apply necessary updates.

Read More »

TZCERT-SU-24-0009 (WordPress Security Update)

Wordfence has released security updates to address vulnerabilities in WP Compress, ARForms, LearnPress and DSGVO Compliant. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Wordfence Security Advisories wp-compress, arforms, learnpress-4257, learnpress-4257-un and omgf-gdprdsgvo-compliant and apply necessary updates.

Read More »

TZCERT-SU-24-0008 (Gentoo Linux Security Update)

Gentoo has released security update to address a vulnerability in joblib. Exploitation of this vulnerability may allow an attacker to take control of affected system. Users and administrators are encouraged to review Gentoo Security Advisory and apply necessary updates.

Read More »

TZCERT-SU-24-0007 (Wireshark Security Update)

Wireshark has released security updates to address vulnerabilities in Wireshark. Exploitation of these vulnerabilities may allow an attacker to make Wireshark crash. Users and administrators are encouraged to review Wireshark Security Advisories wnpa-sec-2024-05, wnpa-sec-2024-04, wnpa-sec-2024-03, wnpa-sec-2024-02 and wnpa-sec-2024-01 and apply necessary updates.

Read More »

TZCERT-SU-24-0006 (Red Hat Security Update)

Red Hat has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories and apply necessary updates.

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe