An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
Archive for April 13th, 2022
Gzip could be made to overwrite arbitrary files.
MySQL 8.0.28 Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html
The 5.16.19 stable kernel update contains a number of important fixes across the tree.
– Update to latest upsream (Firefox 99.0 & nss 3.77)
A minor version update (from 7.10.1 to 7.10.2) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact
Red Hat OpenShift Container Platform release 4.7.48 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7.
An update for rh-dotnet31-curl is now available for .NET Core on Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact
Red Hat AMQ Streams 2.1.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
XZ Utils could be made to overwrite arbitrary files.
– Update to latest upsream (Firefox 99.0 & nss 3.77)
XZ Utils could be made to overwrite arbitrary files.
Gzip could be made to overwrite arbitrary files.
Welcome to our new series of blog posts in which we’re going to explore not only our products but also how we in the Plesk team are using the tools for ourselves. Today we’re focusing on the site monitoring features of 360 Monitoring and how we set it up for our own website: plesk.com. Let’s go! Which websites are we monitoring? As our website plesk.com does not just consist of a single page, we’re monitoring the website from multiple angles. Currently we’re checking the following pages each 60 seconds: The Plesk Homepage Our Imprint Our Legal Pages & Privacy Policy…
The post How Plesk Uses 360 Monitoring For its Own Sites appeared first on Plesk.
Several security issues were fixed in nginx.
Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
Several vulnerabilities were discovered in Subversion, a version control system. CVE-2021-28544