Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to delete certain system files, cause a DoS (Denial of Service), or gain escalated privileges.
b80de59b2bedbf6ac48eb42b2077071712b68296c1422b8b456a9e25a298d447
Secunia Security Advisory - Some vulnerabilities have been reported in Gallery, which can be exploited by malicious users to manipulate data.
011f24683178059ab2f2e9ea9a5cd0abe51dd1a6ef86ed194501b139f46b6d9e
Secunia Security Advisory - Will Dormann has reported some vulnerabilities in the Broderbund Expressit 3DGreetings Player ActiveX control, which potentially can be exploited by malicious people to compromise a user's system.
086e5cfe1aa87e0df14ab1a45c0a8c25b8cd0ca06c8e4ef34e95c3d275873f38
Secunia Security Advisory - Fedora has issued an update for mapserver. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or to potentially compromise a vulnerable system.
2d8a7b0c13d85c6598b19b2b74be7e626e9ad1e84742f1856025c89464303557
Secunia Security Advisory - Fedora has issued an update for gallery2. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain data.
0661737f611ff4faa29b8cd3fff5325d1bebb943d277141d783e4b4deaccbcf3
Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Video IP Gateway and Services Platform, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.
bbc9f90f437f71765bd3929b4764e409845a45b924db38f283a6c4499fbf3969
Secunia Security Advisory - Two vulnerabilities have been reported in the Cisco Catalyst Content Switching Modules (CSM) and Cisco Catalyst Content Switching Module with SSL (CSM-S), which can be exploited by malicious people to cause a DoS (Denial of Service).
f4cc45ae08bec8e975553ff836f8ff4420449645c2ea2d2a277154aa02c896fc
Secunia Security Advisory - A vulnerability has been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system.
b97e6baf02d4d254444ac5821cc6658e0badfdb16dbf78f5218af7a6b485e5c5