Secunia Security Advisory - Debian has issued an update for devscripts. This fixes some weaknesses, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
03d4af65cfb4239fafd1be2193f76a80f95b5991315785fc5239f399a61a5ca2
Secunia Security Advisory - SUSE has issued an update for java-1_4_2-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
8106366f2efc77454d7667f062e59d7e20e5c4814b83326e7123f0c210b70514
Secunia Security Advisory - Some vulnerabilities have been reported in XML-RPC for C/C++, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library.
7b571e4e1de4257c8d4f7d740d084d399352c76a29536f76b0c69b5eea167090
Secunia Security Advisory - SUSE has issued an update for qemu. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.
b97177070d94e594f0123b088409bab6ec38ff5978d9c0784175bf84c2a03ff9
Secunia Security Advisory - SUSE has issued an update for java-1_6_0-openjdk. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
aa6fe02fcd662b4ec13282d1712c165f8aa1e6ee8154ba62ff340b0c9573b8a7
Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
7e09608efd2833f3ed60c95cfb7633c0c5a8acea71743b42823a90ac6cd6059c
Secunia Security Advisory - Two vulnerabilities have been reported in Trend Micro InterScan Messaging Security Suite, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.
301b6f92d123cc43319238da06a6abd468933b6d878b4cde577584cf33d62c03
Secunia Security Advisory - SUSE has issued an update for xen. This fixes multiple vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.
877ce11116ace3b7e5a870c46f3394ba46f6ac484d262bd77dc2e39981c2b739
Secunia Security Advisory - A vulnerability has been reported in the Continuous Integration Game plugin for Jenkins, which can be exploited by malicious people to conduct cross-site scripting attacks.
9f98c95981ab095a881c822ca29e0863c7912d2465f121f3bba1943b38c59c93
Secunia Security Advisory - A vulnerability has been reported in the Violations plugin for Jenkins, which can be exploited by malicious people to conduct cross-site scripting attacks.
024796c40a58c3c7935b7d4c180cb10e1bfb95bf77bc636a407253ac2a21fe4b
Secunia Security Advisory - Red Hat has issued an update for openjpeg. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.
af6d518ece49c59fad1292a5ba8602d35854f18f859b874086d8bfba6909032e
Secunia Security Advisory - SUSE has issued an update for freeradius. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
75d98703641ea53f2a1caad111ffaf3800eed459e69aa8452ecb03f053d13d49
Secunia Security Advisory - A vulnerability has been reported in TAGWORX.CMS, which can be exploited by malicious people to conduct SQL injection attacks.
900d66c6d230e35208d09bb271eeca1d6fea941a5c26b73fe18194b6a07e0c39
Secunia Security Advisory - SUSE has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
9e410510063e16ad59cdce1184d86f7dc943c399ba073e2de2f046c5ef0a4392
The xyleborini.tamu.edu site suffers from a cross site scripting vulnerability.
4f88ed7a023e0920a77e80db5cb7198de51117fa5c8651973c231353a4dc57e1
Firstlink CMS suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.
58be632f68ff8d719c6cc5463e32182f4b7959cd9c1536ae91eeb81c324c78ac
The med.stanford.edu site suffers from a cross site scripting vulnerability.
26cbcda4ef772831a47575ad437d5a04a414a6ed96e780452ac0b6f2ee00e8ab