Splunk ha rilasciato aggiornamenti di sicurezza per correggere 8 vulnerabilità nei propri prodotti, di cui una con gravità “critica”. Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Splunk ha rilasciato aggiornamenti di sicurezza per correggere 8 vulnerabilità nei propri prodotti, di cui una con gravità “critica”. Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: June 14, 2022 Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following Adobe Security Bulletins and…
Aggiornamenti di sicurezza risolvono due vulnerabilità in Drupal Core. Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: June 9, 2022 CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise….
Lo CSIRT Italia rende disponibile un’analisi dei dispositivi Zyxel vulnerabili e/o non più supportati dal vendor presenti sul territorio nazionale. Source link Author: csirt@alfacert.gov.it(CSIRT Italia) Article used for cyber security disclosure.
Original release date: June 10, 2022 Google has released Chrome version 102.0.5005.115 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. CISA encourages users and administrators to review the Chrome Release Note and apply…
Nuovo aggiornamento di Google Chrome per Windows, Mac e Linux corregge 7 vulnerabilità di sicurezza. Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: June 8, 2022 CISA has added 36 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise….