Secunia
[SA16965] Fedora update for firefox
Critical: Extremely critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System
access
Released: 2005-09-27
Fedora has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16965/
[SA16960] Slackware update for mozilla
Critical: Extremely critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System
access
Released: 2005-09-27
Slackware has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16960/
[SA16928] Ubuntu update for mozilla/mozilla-firefox
Critical: Extremely critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System
access
Released: 2005-09-26
Ubuntu has issued updates for mozilla and mozilla-firefox. These fix
some vulnerabilities, which can be exploited by malicious people to
conduct spoofing attacks, manipulate certain data, bypass certain
security restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16928/
[SA16919] Red Hat update for firefox
Critical: Extremely critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System
access
Released: 2005-09-23
Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16919/
[SA16986] Fedora update for HelixPlayer
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-28
Fedora has issued an update for HelixPlayer. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16986/
[SA16980] TWiki "%INCLUDE" Shell Command Injection Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-28
A vulnerability has been reported in TWiki, which can be exploited by
malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16980/
[SA16976] Gentoo update for php
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-28
Gentoo has issued an update for php. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/16976/
[SA16974] SGI Advanced Linux Environment Multiple Updates
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-28
SGI has issued a patch for SGI Advanced Linux Environment. This fixes
some vulnerabilities, which can be exploited by malicious people to
cause a DoS (Denial of Service) or to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16974/
[SA16964] Fedora update for mozilla
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System
access
Released: 2005-09-27
Fedora has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16964/
[SA16962] Red Hat update for HelixPlayer
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-27
Red Hat has issued an update for HelixPlayer. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16962/
[SA16961] RealPlayer Error Message Format String Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-27
c0ntex has discovered a vulnerability in RealPlayer, which potentially
can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16961/
[SA16954] Helix Player Error Message Format String Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-09-27
c0ntex has discovered a vulnerability in Helix Player, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/16954/
[SA16953] Mandriva update for mozilla
Critical: Highly critical
Where: From remote
Impact: System access, Manipulation of data, Spoofing, Security
Bypass
Released: 2005-09-27
Mandriva has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16953/
[SA16948] Trustix update for clamav
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-26
Trustix has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service), or potentially to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16948/
[SA16930] SUSE update for clamav
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-26
SUSE has issued an update for clamav. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), or potentially to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16930/
[SA16920] Mac OS X Security Update Fixes Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Exposure of
sensitive information, Privilege escalation, System access
Released: 2005-09-23
Apple has issued a security update for Mac OS X, which fixes 10
vulnerabilities.
Full Advisory:
http://secunia.com/advisories/16920/
[SA16918] Red Hat update for mozilla
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data, System access
Released: 2005-09-23
Red Hat has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16918/
[SA16972] Debian update for python2.3
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-28
Debian has issued an update for python2.3. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16972/
[SA16968] SUSE update for opera
Critical: Moderately critical
Where: From remote
Impact: Unknown, Cross Site Scripting, Spoofing
Released: 2005-09-27
SUSE has issued an update for opera. This fixes two vulnerabilities,
which can be exploited by a malicious person to conduct script
insertion attacks and to spoof the name of attached files.
Full Advisory:
http://secunia.com/advisories/16968/
[SA16967] Astaro Security Linux PPTP Denial of Service Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-09-27
A vulnerability has been reported in Astaro Security Linux, which can
be exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16967/
[SA16957] Gentoo update for qt
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-27
Gentoo has issued an update for qt. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16957/
[SA16945] jPortal Download Search SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-09-27
krasza has discovered a vulnerability in jPortal, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/16945/
[SA16940] Gentoo update for webmin/usermin
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-09-26
Gentoo has issued an update for webmin/usermin. This fixes a
vulnerability, which can be exploited by malicious people to bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16940/
[SA16939] Debian update for courier
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-09-26
Debian has issued an update for courier. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.
Full Advisory:
http://secunia.com/advisories/16939/
[SA16938] Gentoo update for mantis
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2005-09-26
Gentoo has issued an update for mantis. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/16938/
[SA16936] wzdftpd SITE Command Arbitrary Shell Command Injection
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-09-26
kcope has discovered a vulnerability in wzdftpd, which can be exploited
by malicious users to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16936/
[SA16923] Interchange Catalog Skeleton SQL Injection and ITL Injection Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown, Manipulation of data
Released: 2005-09-23
Two vulnerabilities have been reported in Interchange, which can be
exploited by malicious people to conduct SQL injection attacks, or to
perform actions with an unknown impact.
Full Advisory:
http://secunia.com/advisories/16923/
[SA16914] Debian update for python2.1
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-23
Debian has issued an update for python2.1. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16914/
[SA16943] IBM HMC apache/mod_ssl Vulnerabilities
Critical: Less critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Manipulation of
data, Privilege escalation
Released: 2005-09-26
IBM has acknowledged some vulnerabilities in IBM HMC, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or potentially gain escalated privileges, or by malicious people to
bypass certain security restrictions or conduct HTTP request smuggling
attacks.
Full Advisory:
http://secunia.com/advisories/16943/
[SA16978] Polipo Disclosure of Sensitive Information
Critical: Less critical
Where: From local network
Impact: Unknown, Exposure of sensitive information
Released: 2005-09-28
A vulnerability has been reported in Polipo, which can be exploited by
malicious people to disclose potentially sensitive information.
Full Advisory:
http://secunia.com/advisories/16978/
[SA16950] Red Hat update for cups
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-09-27
Red Hat has issued an update for cups. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/16950/
[SA16912] Fedora update for cups
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-09-23
Fedora has issued an update for cups. This fixes a vulnerability, which
can be exploited by malicious users to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16912/