Secunia
[SA14315] Ubuntu update for lesstif2
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-02-17
Ubuntu has issued an update for lesstif2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14315/
[SA14301] Conectiva update for XFree86
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-02-15
Conectiva has issued an update for XFree86. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14301/
[SA14287] Debian update for awstats
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-02-15
Debian has issued an update for awstats. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/14287/
[SA14260] SGI Advanced Linux Environment update for less/xpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-02-14
SGI has issued a patch for less and xpdf in SGI Advanced Linux
Environment. This fixes some vulnerabilities, which can be exploited by
malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14260/
[SA14259] SGI Advanced Linux Environment Multiple Updates
Critical: Highly critical
Where: From remote
Impact: Privilege escalation, DoS, System access
Released: 2005-02-14
SGI has issued a patch for SGI Advanced Linux Environment. This fixes
some vulnerabilities, which can be exploited to cause a DoS (Denial of
Service), gain escalated privileges, or potentially compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/14259/
[SA14318] Debian update for emacs21
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-02-17
Debian has issued an update for emacs21. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14318/
[SA14308] Gentoo update for lighttpd
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-02-16
Gentoo has issued an update for lighttpd. This fixes a vulnerability,
which can be exploited by malicious people to disclose some potentially
sensitive information.
Full Advisory:
http://secunia.com/advisories/14308/
[SA14307] Gentoo update for emacs/xemacs
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-02-16
Gentoo has issued updates for emacs and xemacs. These fix a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/14307/
[SA14305] Mandrake update for emacs
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-02-16
MandrakeSoft has issued an update for emacs. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/14305/
[SA14297] lighttpd "%00" Application Source Code Disclosure Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-02-16
A vulnerability has been reported in lighttpd, which can be exploited
by malicious people to disclose some potentially sensitive information.
Full Advisory:
http://secunia.com/advisories/14297/
[SA14296] Ubuntu update for kernel
Critical: Moderately critical
Where: From remote
Impact: Unknown, Security Bypass, Exposure of sensitive information, DoS
Released: 2005-02-16
Ubuntu has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain knowledge of potentially sensitive information or cause a DoS
(Denial of Service), or by malicious people to cause a DoS or bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/14296/
[SA14295] Linux Kernel Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown, Security Bypass, Exposure of sensitive information, DoS
Released: 2005-02-16
Some vulnerabilities have been reported in the Linux kernel. These can
be exploited by malicious, local users to gain knowledge of potentially
sensitive information or cause a DoS (Denial of Service), or by
malicious people to cause a DoS or bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/14295/
[SA14288] Mandrake update for mailman
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-02-15
MandrakeSoft has issued an update for mailman. This fixes a
vulnerability, which can be exploited by malicious people to gain
knowledge of users' passwords.
Full Advisory:
http://secunia.com/advisories/14288/
[SA14282] Gentoo update for opera
Critical: Moderately critical
Where: From remote
Impact: Spoofing, Exposure of system information, Privilege escalation, System access
Released: 2005-02-15
Gentoo has issued an update for opera. This fixes some vulnerabilities,
which can be exploited by malicious people to disclose some system
information, spoof the content of websites, trick a user into executing
malicious files and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14282/
[SA14281] Fedora update for xemacs
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-02-15
Fedora has issued an update for xemacs. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14281/
[SA14279] Red Hat update for python
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access
Released: 2005-02-14
Red Hat has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/14279/
[SA14267] Trustix Updates for Multiple Packages
Critical: Moderately critical
Where: From remote
Impact: Unknown, Security Bypass, Manipulation of data, Exposure
of sensitive information, Privilege escalation, DoS, System access
Released: 2005-02-14
Trustix has issued updates for bind, clamav, cpio, cups, mod_python,
perl, postgresql, python and squid. These fix some vulnerabilities, one
with an unknown impact and others which can be exploited to gain
escalated privileges, cause a DoS (Denial of Service), disclose and
manipulate sensitive information, bypass certain security restrictions
and compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14267/
[SA14258] Conectiva update for evolution
Critical: Moderately critical
Where: From remote
Impact: Privilege escalation, System access
Released: 2005-02-17
Conectiva has issued an update for evolution. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges and by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14258/
[SA14257] SUSE update for mailman
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-02-15
SUSE has issued an update for mailman. This fixes a vulnerability,
which can be exploited by malicious people to gain knowledge of users' passwords.
Full Advisory:
http://secunia.com/advisories/14257/
[SA14252] SUSE Updates for Multiple Packages
Critical: Moderately critical
Where: From remote
Impact: Privilege escalation, DoS, System access
Released: 2005-02-14
SUSE has issued updates for multiple packages. These fix various
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges and by malicious people to cause a DoS
(Denial of Service) and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14252/
[SA14251] Red Hat update for squid
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS, System access
Released: 2005-02-14
Red Hat has issued an update for squid. This fixes multiple
vulnerabilities, which can be exploited to cause a DoS (Denial of
Service), bypass certain security restrictions, or potentially
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14251/
[SA14314] Gentoo update for kdeedu
Critical: Moderately critical
Where: From local network
Impact: Privilege escalation, System access
Released: 2005-02-17
Gentoo has issued an update for kdeedu. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges and potentially by malicious people to
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14314/
[SA14306] KDE fliccd Buffer Overflow Vulnerabilities
Critical: Moderately critical
Where: From local network
Impact: Privilege escalation, System access
Released: 2005-02-16
Erik Sjölund has reported some vulnerabilities in KDE, which can be
exploited by malicious, local users to gain escalated privileges and
potentially by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14306/
[SA14261] SGI Advanced Linux Environment update for krb5
Critical: Moderately critical
Where: From local network
Impact: Privilege escalation, System access
Released: 2005-02-14
SGI has issued a patch for krb5 in SGI Advanced Linux Environment. This
fixes two vulnerabilities, which can be exploited to perform certain
actions on a vulnerable system with escalated privileges or potentially
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14261/
[SA14303] Debian update for htdig
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-02-15
Debian has issued an update for htdig. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Full Advisory:
http://secunia.com/advisories/14303/
[SA14290] Gentoo update for postgresql
Critical: Less critical
Where: From remote
Impact: Privilege escalation
Released: 2005-02-15
Gentoo has issued an update for postgresql. This fixes a vulnerability,
which can be exploited by malicious users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/14290/
[SA14285] Sun Solaris FTP Server PASV Commands Denial of Service
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-02-15
Sun has acknowledged an older vulnerability in Sun Solaris, which can
be exploited by malicious users to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14285/
[SA14280] Red Hat update for postgresql
Critical: Less critical
Where: From remote
Impact: Security Bypass, Privilege escalation, DoS
Released: 2005-02-14
Red Hat has issued an update for postgresql. This fixes various
vulnerabilities, which can be exploited by malicious users to gain
escalated privileges, cause a DoS (Denial of Service), or bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/14280/
[SA14276] Gentoo update for htdig
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-02-14
Gentoo has issued an update for htdig. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Full Advisory:
http://secunia.com/advisories/14276/
[SA14275] Gentoo update for pdns
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-02-14
Gentoo has issued an update for pdns. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14275/
[SA14271] Squid FQDN Lookup Denial of Service Vulnerability
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-02-14
A vulnerability has been reported in Squid, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14271/
[SA14269] Gentoo update for mod_python
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-02-14
Gentoo has issued an update for mod_python. This fixes a vulnerability,
which potentially can be exploited by malicious people to disclose
sensitive information.
Full Advisory:
http://secunia.com/advisories/14269/
[SA14255] ht://Dig "config" Parameter Cross-Site Scripting Vulnerability
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-02-14
Michael Krax has reported a vulnerability in ht://Dig, which can be
exploited by malicious people to conduct cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/14255/