Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Archive for January 23rd, 2023
Ruby could allow for internet traffic to be modified if a vulnerable application processed malicious user input.
An update for firefox is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
HAProxy could be made to stop responding if it received specially crafted network traffic.
How to Grant Access to Your Website in a Secure Way
A common practice in web development: Outsourcing Many site owners hire external web agencies to develop their website. In such cases, these site owners need to give access to their Plesk Panel and account to allow the agency to take key actions within the Panel. The most obvious and easy way of doing this is to share with them your access credentials. But stop right there! This is NOT A SECURE way to solve this task! Luckily, Plesk has the solution. As you may know, for several years Plesk has been offering the functionality of ‘additional users’, which allows you…
The post How to Grant Access to Your Website in a Secure Way appeared first on Plesk.
The 6.1.7 stable kernel update contains a number of important fixes across the tree.