Secunia Security Advisory - Mark Litchfield has reported two vulnerabilities in EnjoySAP, which can be exploited by malicious people to compromise a user's system.
22dedd501b18cdc372226b41aa5da9970ed9ed408a742985150383e9995f7b40
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Citrix Presentation Server Clients.
051b1fff81feb56b5415ac94662bdde1465d4e39a2a8849972e1bae9df27e761
Secunia Security Advisory - Steve Kemp has reported a security issue in Gfax, which can be exploited by malicious, local users to gain escalated privileges.
f59be7782e0917f0c68495f96967e20b9bd2191511c1a43d1547d473b0c5fe73
Secunia Security Advisory - A vulnerability has been reported in SILC Client and SILC Toolkit, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
3085b382a90368275a7bed5f52aaaed3709643539cb1448998d57a135fffee43
Secunia Security Advisory - GeFORC3 has reported a vulnerability in Levent Veysi Portal, which can be exploited by malicious people to conduct SQL injection attacks.
3cf13ec18d5c4edbeea9073c95c8cddff8fe5054ff2869c201313c93837cbaed
Secunia Security Advisory - Mark Litchfield has reported a vulnerability in SAP Internet Graphics Service (IGS), which can be exploited by malicious people to conduct cross-site scripting attacks.
f29467def3582299c26ecb4b32a37cf70e97e94d757569df3804aa8311d3343d
Secunia Security Advisory - Mark Litchfield has reported a vulnerability in SAP DB, which can be exploited by malicious people to compromise a vulnerable system.
929e943068cbc011bbb81edd5066172d1ca7dae24962af58d907a5dc7eda54f5
Secunia Security Advisory - Gentoo has issued an update for webmin and usermin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
778e5e523882d8023ad35c531e7bd2cc5e3416fa560f01c2a1abd7b092bc3eab
Secunia Security Advisory - Mark Litchfield has reported a vulnerability in SAP Web Application Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
047f2b34344ba06d9335ff745567f39164acb649d7760cfc891f4863e93ec593
Secunia Security Advisory - Carl Livitt has reported a vulnerability in AsteriDex, which can be exploited by malicious people to compromise a vulnerable system.
285614c05f7725486aa8b466212106a3b0c54e4f9fa9f547c12684708aa71db6
Secunia Security Advisory - Mark Litchfield has reported a vulnerability in SAP Message Server, which can be exploited by malicious people to compromise a vulnerable system.
1d4b247ed5870fda160955ae3d4ca84e8422a50207398eae15142146300cd18f
Secunia Security Advisory - A vulnerability has been reported in MDaemon, which can be exploited by malicious people to cause a DoS (Denial of Service).
0f9116b2a397b373fbb7b3a43da9f4e54c1ee22d35b712d1f740d865c8e75787
Secunia Security Advisory - A vulnerability has been reported in Hitachi TPBroker, which can be exploited by malicious people to cause a DoS (Denial of Service).
849a75e804a46a706b1c3981b5c07888768f74c1ef0da5c33a48432733edd342
Secunia Security Advisory - Two vulnerabilities have been reported in Hitachi JP1/HiCommand products, which can be exploited by malicious people to potentially bypass certain security restrictions or to conduct cross-site scripting attacks.
193ba995472c880fd4d6f4e37bf84b91564d255aba90ed9934db49dbdc6c592f
Secunia Security Advisory - Some vulnerabilities have been reported in eMeeting Online Dating Software, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.
e87dd517842cc02a37defa0b75d02aa192516a7e34dc415e32d0fab6371cbad3
Secunia Security Advisory - SUSE has issued an update for freetype2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
6f28ee3933d21505aedf5fe132cd68755e0137ca43f125f35d91c0d1cdfb6218
Secunia Security Advisory - Gentoo has issued an update for glibc. This fixes a potential vulnerability, which may be exploited by malicious, local users to gain escalated privileges.
eef0a28b8a968d164b235313129c8b741f30942e7f5900cba5573a0026d19fb9
Secunia Security Advisory - SUSE has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.
3049ac3e30bb662281bd437d1de3ee339df743519e0e84d1722a89d84733d93f
Secunia Security Advisory - A vulnerability has been reported in ArcadeBuilder Game Portal Manager, which can be exploited by malicious people to conduct SQL Injection attacks.
aeec5264b3c5dab326d0a441db760a7c727f378c1d2ec50d3fecde433e96bd9b
Secunia Security Advisory - A vulnerability has been reported in Oracle Rapid Install, which can be exploited by malicious people to conduct cross-site scripting attacks.
e3ff9ca2dd7b64bfee4732b2c3ab7c9f15a927c804296ca0883073ebe0ec9fa6
Secunia Security Advisory - Mandriva has issued an update for apache. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and malicious people to conduct cross-site scripting attacks.
e4700dab2681fddd381ac54383e3c49a5846310669294d3e7189a6faad84e3d8
Secunia Security Advisory - A vulnerability has been discovered in SuperCali PHP Event Calendar, which can be exploited by malicious people to conduct SQL Injection attacks.
c9e389a3d403f79484c67a84de66cf3f7ee95048fad05ed940326ebc3e7170c3
Secunia Security Advisory - Cold z3ro has discovered a vulnerability in Girlserv Ads, which can be exploited by malicious people to conduct SQL Injection attacks.
7b0e588ae22e649885f40be3dcfe74a47053bf88736f67b1a21cf864ff503d42
Secunia Security Advisory - Two vulnerabilities have been reported in Elite Bulletin Board, which can be exploited by malicious users and malicious people to manipulate certain data.
eb817b459deb30b0c2855ab52180b719d563b139875047842684fa90126a40e7
Secunia Security Advisory - MustLive has discovered a vulnerability in Moodle, which can be exploited by malicious people to conduct cross-site scripting attacks.
694dd1d82f804a6c4856bbd5b081198245b676c3162642b8fccf788ecf7aed1f