Secunia Security Advisory - Debian has issued an update for request-tracker. This fixes a vulnerability, which can be exploited by malicious people to conduct session fixation attacks.
a020d59854b4c632e74c953eae8bcb17def59734fa1812f66616a5b6a87558d3
Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to conduct spoofing attacks.
db3f63b5a113a056ae9dcfbf347a3491bc050e3298b9d1e17499b3bd6086940b
Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to crash an application linked against the libexpat library.
9062c580893da2980dc6916eb9fff5ab3ceeb9e6d12a25f5b62c8addf525c28b
Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Sun Management Center, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the libxml2 library.
c92abf04f3c1fb11a65e7942219e2acd4994c9f8f09b54a4527b7a1a056bbba5
Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes some vulnerabilities, which can be exploited by malicious people to potentially disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), or to compromise a user's system.
935ca4a55ef17dc5c10fa1416b55bb292b0cd08594dc91359a2fbcf1615cc5cf
Secunia Security Advisory - Some vulnerabilities have been reported in IIPImage Server, which potentially can be exploited by malicious people to compromise a vulnerable system.
4855e70066bdcee7a07345d88c359c1d821a05100d498995d4e8db030afcb1de
Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.
1c9d923dcab734bb7bdcee08a81ebdd5a15356d33027bd739c3a21214fcdfb00
Secunia Security Advisory - Diego Juarez has reported a security issue in DAZ Studio, which can be exploited by malicious people to compromise a user's system.
84714073b9fefbb3167addde226eeeae96ffc996a040ca3ab2bd7e52d8d58368
Secunia Security Advisory - A security issue and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to manipulate certain data and cause a DoS (Denial of Service), and by malicious people to potentially compromise a vulnerable system.
157e759b162dcda8ba5d02c8cd8ad1b6b72f49cc118b859e0906db5324dd6592
Secunia Security Advisory - Secunia Research has discovered a vulnerability in DevIL, which can be exploited by malicious people to compromise an application using the library.
100067309ea7d81bd6e414748110bd1ebb1a500f9e63da50091e0dba8d5df6cf
Secunia Security Advisory - Debian has issued an update for gforge. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
3381c752591afe9e1ca8a4640f16ecb31af66594866dc5b6e4a588c1d2e8c6b0
Secunia Security Advisory - K053 has reported a vulnerability in Micronet SP1910 Network Access Controller, which can be exploited by malicious people to conduct cross-site scripting attacks.
706ad49b248dc9c0da219502f3bd8602ed10af55918019b99043847025b999d9
Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some security issues and a vulnerability, which can be exploited by malicious, local users to manipulate certain data, cause a DoS (Denial of Service), or gain escalated privileges.
1a23fe6df097df6e6c8a5c7fbe8a183d5ef35d3cd377979770c5a38f5b341b6f
Secunia Security Advisory - Nac Mac Feegle has discovered multiple vulnerabilities in Uiga Church Portal, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system.
dd3b2338bc8d2dd8a4da3ff5096dd4eeca90dd27c853e1c19d2ac1a5678b2f83
Secunia Security Advisory - Some vulnerabilities have been discovered in Simple Machines Forum, which can be exploited by malicious users and malicious people to conduct cross-site request forgery attacks.
1069d724ad96ed921afcc3608dd7b3adc513fe4f24d4b6bf9e2cf4b642bc692a
Secunia Security Advisory - andresg888 has discovered a vulnerability in YJ Whois module for Joomla, which can be exploited by malicious people to conduct cross-site scripting attacks.
fde1005549382cba99eb1f7979fb149a79d371dd762ffb0dbe448edb27628f6a
Secunia Security Advisory - fl0 fl0w has discovered a vulnerability in Jasc Paint Shop Pro, which can be exploited by malicious people to compromise a user's system.
d82d42a63e7b1fd1500bdd621872e8f722c94dfdb36855dd59e7456be7811859
Secunia Security Advisory - Ubuntu has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
a4528b20030c01f519e93dcab751905b25d5107ff1f9bbfd0df1a5baab18dedc
Jasc Paint Shop pro version 8 universal local buffer overflow exploit that creates a malicious .png file.
4a5400aa187a892c6a698ad0935e27ff8b0f86c55a675a4cd10f3673e53418ea
Vivid Ads Shopping Cart suffers from a remote SQL injection vulnerability.
7ac039f87f3ddbdc33c06a1379610e47d9a148a315ce6cf161ee101a008bf7a2
PHP suffers from an ini_restore() related memory information disclosure vulnerability.
2cb1b058ea1c9470f0fb1332b5e80ee970764c67f4f3fd6b726311532d1ceb21
Mandriva Linux Security Advisory 2009-203 - lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.
1f78d592fc4f54b1bb49537fdad92e1016818216c01e1aee842997387961d388
Mandriva Linux Security Advisory 2009-201 - socket.c in fetchmail before 6.3.11 does not properly handle a '\\0' (NUL) character in a domain name in the subject's Common Name (CN) and subjectAlt(ernative)Name fields of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.
4aba094aed5936c7ea5deea95cdcd8b2b4f9927a8b2c97e80c7ef02c3672c820
Mandriva Linux Security Advisory 2009-200 - Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework. Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework. This update provides a solution to these vulnerabilities. Packages for 2008.0 are being provided due to extended support for Corporate products.
10052ef6846e335473582e3fa7540be316e3d8bf1fae67af2a046d1a3ff15702
Mandriva Linux Security Advisory 2009-287 - Multiple vulnerabilities have been found and corrected in xpdf.
b7df1aa36ed4c7cf25a57942409eb64263e9e0ae6b9559c1f0ed8dd9d8b1cfad