Secunia Security Advisory - A vulnerability has been reported in OpenLDAP, which can be exploited by malicious users to cause a DoS (Denial of Service).
d1e6643ad5860a1ed9ca82caf1cfd592ac11ce82f287f5c9d997a0d624ec45b8
Secunia Security Advisory - A vulnerability has been reported in iTheora, which can be exploited by malicious people to disclose potentially sensitive information.
2031863167eb7c46a1008c9ebbb17db82126ef2cee42f1858c5e4c579df796c2
Secunia Security Advisory - Gentoo has issued an update for boost. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
80e134d9e1566d2720be08170734079d347ed1164152718f6cd099996ccfd7da
Secunia Security Advisory - Michael Brooks has discovered a vulnerability in Etomite, which can be exploited by malicious people to conduct cross-site scripting attacks.
4126a7814b1dcfe9692967d1f51140118d61b49ef58ae660258c8bae6d470f81
Secunia Security Advisory - HP-UX has issued an update for Apache. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
34895f216c18312a783d289c89a933a64110d8c0856d240555b1b3e8a35cc235
Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes a security issue and some vulnerabilities, where one has an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and corrupt a file system, and by malicious people to cause a DoS.
602616f95c6bda226f762daba95980ad4a5d1a7e87a20e34eb30a139ec725a0d
Secunia Security Advisory - Some vulnerabilities have been reported in PHParanoid, which can be exploited by malicious people to conduct cross-site request forgery attacks and to bypass certain security restrictions.
ff346fbc92fbbbf163e3ff6001d4bc9aac571c23e226b33be19252537c7f35bb
Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Unified IP Phone models, which can be exploited by malicious users to compromise a vulnerable device or by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable device.
adf2a625239a7c2303a7eb34ce43703a642bc450f5a72a6f7987ef98131fe819
Secunia Security Advisory - Gentoo has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
dc65797c65c08405865359f0955c2460450523941ffc8e7378ab4abf61579afd
Secunia Security Advisory - Fedora has released an update for glib2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
ced3849879bbd4cfb7fbdb326e71aae9f8bad4f03c8f05e76d9725a6b563e974
Mandriva Linux Security Advisory - Multiple heap-based buffer overflow vulnerabilities along with various array index flaws allow for arbitrary code execution in mplayer.
f1bcf0cf473fccd78e6b2308c1d9435a3aa262e40d0aead2dc19974921211ce7
Gentoo Linux Security Advisory GLSA 200802-08 - Tavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions. Versions less than 1.34.1-r2 are affected.
79f9d54b81900fb2c8b6e3e1425944c10054423b74336270a45969fe88fb9caf
PlutoStatus Location version 1.0pre alpha suffers from a local file inclusion vulnerability.
fd9edb236cf8ef8363120b004da55760982b20e99984c8cb03adcdd92cd61ca6
Scribe version 0.2 suffers from a local file inclusion vulnerability.
d8f45be1fbc6424c444a8b17628fbece166c6951bc6c6b575daae8a138728e69
The IPDiva VPNSSL versions 2.2.8.84 and below and 2.3.2.14 and below suffer from a cross site scripting vulnerability.
930d75d65b2255088fc74b6733c9e647cfeca9900ba3059f0d6a6593e1490cea
The IPDiva VPNSSL versions 2.2.8.84 and below and 2.3.2.14 and below suffer from a brute force attack vulnerability where the retry limit is based on a value provided in the cookie.
7657598b26ae538a1ef575501b7e2787599032711da9e53a976000aeb046a078
Rosoft Media Player version 4.1.8 suffers from a buffer overflow vulnerability when parsing .M3U files.
929ecc927e49e856d1f9bf77a36c25ab3f7dd9d2985dd103ce50a9d332bc52c0