Secunia Security Advisory - A vulnerability has been reported in the Drupal Links Package, which can be exploited by malicious users to conduct script insertion attacks.
7ed75c971bad04a9d5a75fa5f4a6772afe834d8b691559f1e62a62df041ace2d
Secunia Security Advisory - Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to potentially compromise a user's system.
6e900cc7fc13a2e127764c69dbf51d41498093a9b70804c78053fcbd206b3598
Secunia Security Advisory - Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a vulnerable system.
4b01504221bdc7389b6aba6bb5b6e2f337baa3e084cfbc99b102b7bc695d2b7b
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges.
71bdacf246f1264554a04194e430eaa6ef1a810c6510fee025fcae1714bb080a
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to disclose sensitive information.
880f478221551aa3dde3139d40b82a0adc155443cddcff00bb8049dfc8dc291b
Secunia Security Advisory - Red Hat has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.
2ac7f4e6c29619447dae9fd0203f439764aa783c67793710bc22ed608346c5e5
Secunia Security Advisory - Red Hat has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
c7eabcadd4dcc84fbdcbe25e730b61ad06b602c3671089d1201dac822804a426
Secunia Security Advisory - Some vulnerabilities have been reported in KDE, which can be exploited by malicious people to compromise a user's system.
89a80412a098c9e8317681b66794cc7154bc4c3206019fc53d767a20be2f8a66
Secunia Security Advisory - Red Hat has issued an update for kdelibs. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.
efe30f8e656ca9ce5203dc257d4f248364a940a6b947fa6910e031441b036dcb
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain unauthorised access to certain functionality.
a8a6d0bcdd8799e8fe38576f6c2ef29a3af5a10ee0480b9a4594c92f7071e2bb
Ubuntu Security Notice USN-782-1 - Several flaws were discovered in the JavaScript engine of Thunderbird. Several flaws were discovered in the way Thunderbird processed malformed URI schemes. Cefn Hoile discovered Thunderbird did not adequately protect against embedded third-party stylesheets. Shuo Chen, Ziqing Mao, Yi-Min Wang, and Ming Zhang discovered that Thunderbird did not properly handle error responses when connecting to a proxy server. It was discovered that Thunderbird could be made to run scripts with elevated privileges.
e296006439bf4e6a1ca59b0e0c05e05c53359c92accaef6c57eec9cb193bf4ad
iDefense Security Advisory 06.25.09 - Remote exploitation of a stack-based buffer overflow vulnerability in Motorola Inc.'s Timbuktu Pro could allow attackers to execute arbitrary code with SYSTEM privileges. Timbuktu fails to properly handle user-supplied data passed through a named pipe session. When the PlughNTCommand named pipe receives an overly large character string, a buffer overflow will occur resulting in arbitrary code execution. iDefense has confirmed the existence of this vulnerability in Timbuktu Pro version 8.6.5. Previous versions may also be affected.
ab79faf675800d7b7b3746fd9f41707ec4fd077918d41f3c4a45aebd457ac0a3
iDefense Security Advisory 06.25.09 - Remote exploitation of a stack based buffer overflow vulnerability in Unisys's Business Information Server could allow an attacker to execute arbitrary code with the privileges of the affected service. If attackers send a packet to the Unisys Business Information Server over a TCP port, the attacker can corrupt stack memory and gain arbitrary code execution. iDefense has confirmed the existence of this vulnerability in Business Information Server version 10. Previous versions may also be affected.
0f6b851e37ef707c28dc12e307cce811d639b591995017d0726189ad5d30b210
Debian Security Advisory 1823-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server.
b1dd505f4ed9dfea23e529ccd125a387967f454cd3fb8e82cf20c7cf12975af8
Ubuntu Security Notice USN-792-1 - It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. It was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occurred before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. It was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request.
717ab4b4246a89d48753c7a3ecde9c208b28fa3e393959d2b5b602da3f8f1d62
Mandriva Linux Security Advisory 2009-140 - Multiple security vulnerabilities have been identified and fixed in gaim. These include integer and buffer overflows.
bde1a0669082b16d847d1bff535b714ea5b0668ec0d900ac0047e00a3076c148
Zero Day Initiative Advisory 09-044 - This vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used during a memory dereference a possible 4-byte memory overwrite may occur. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.
f837117c97d1a24404c5b9e1e9e7d39a21d1b93e249e693b17106674fade55e9
Secunia Security Advisory - Ubuntu has issued an update for cyrus-sasl2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.
a195a39df8d9df05d1f504207987ee01aa3f4af0c5a5385831a09760bf6db908
Secunia Security Advisory - A vulnerability has been reported in Cisco Physical Access Gateway, which can be exploited by malicious people to cause a DoS (Denial of Service).
c00fdeb9b9fec380ccc8b65bc901f2f7fb223419e3d265412fc9ed8cb88908ad
Secunia Security Advisory - Ubuntu has issued an update for moodle. This fixes a security issue, which can be exploited by malicious users to disclose sensitive information.
f7edb6ee7ec4645a51ccfa1191d80dc20ad5d709406224516f758a9f44775372
Secunia Security Advisory - Ubuntu has issued an update for moodle. This fixes a security issue and some vulnerabilities, which can potentially be exploited by malicious, local users to perform certain actions with escalated privileges, by malicious users to disclose potentially sensitive information, conduct cross-site scripting and script insertion attacks, or compromise a vulnerable system, and by malicious people to conduct cross-site scripting attacks, disclose sensitive information, bypass certain security restrictions, and compromise a vulnerable system.
8c44060639c8a5c7c8b715493036e5363cf96996f93c7663c01414e5db43ecd8
Secunia Security Advisory - Ubuntu has issued an update for smarty. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.
3dea68cec0df02f54ba4584ac714e3ae6eb3fe3346c779b492aa3430567f083a
Secunia Security Advisory - Fedora has issued an update for rt3. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.
2ce6dcdfddc53215f1eacbb460c036cc6f1d566b59ea6c9cd8edd0e536e29595
Secunia Security Advisory - Two vulnerabilities have been reported in Openswan, which can be exploited by malicious people to cause a DoS (Denial of Service).
de379d47c267ac7e9bbc7dad11837200f85c4a3738e00a7eaa862a02eaaf9f95
Secunia Security Advisory - Fedora has issued an update for git. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
d23f41c6adac5ab4b188003a98d64dda822853cea99c7609f5f722471cfed796