http://secunia.com/advisories/24122 - There is a vulnerability in versions of Microsoft Word from Office 2000, 2003, 2004 (Mac) and Microsoft Works that could allow for remote exploitation. This would require the user to open a crafted Word document. This vulnerability was reported in February 2007, and Microsoft just verified the problem and released patches.
http://www.heise-security.co.uk/news/89228/from/atom10 - It appears that three plugins by the same author are suceptible to attack: myFlash, wordTube and wp-Table. Upgrading to the latest version or removing them from the system is the best bet for protection.
http://docs.info.apple.com/article.html?artnum=305391 - This is the second security update in as many months from Apple targetting Mac OS 10.3.9 through 10.4.9. This update fixes various vulnerabilities in the Macintosh operating system and related applications. There has been one IAS related report of difficulty with this update that required multiple reboots to resolve. It is recommended that this patch be tested and your users updated about the issues.
http://secunia.com/cve_reference/CVE-2007-1745/ http://secunia.com/cve_reference/CVE-2007-1997/ - Two vulnerabilities have been discovered in versions of clamav prior to 0.90.2 that could lead to compromising the system or a denial of service attack. It is suggested that you update to version 0.90.2.
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1 - It appears that a vulnerability in Mozilla 1.7 on Solaris 8-10 may allow malicious people to compromise a users system. It has been theorized that Mozilla 1.4 may also be vulnerable. The solution has been suggested to apply patches 119115-25 or 119116-25.
http://www.us-cert.gov/cas/techalerts/TA07-072A.html - It appears that multiple vulnerabilities are present in versions of Mac OS X 10.3.9 up to version prior to 10.4.9. The most serious of these includes a remote exploitation. It is recommended to patch to the latest release of Mac OS X to avoid exploitation.
http://www.kb.cert.org/vuls/id/191609 - It appears that a buffer overflow vulnerability is exploitable in using animated cursors that can be found on various websites and in emails. This affects versions of Microsoft Windows 2000, XP and Vista. The vulnerability allows for automatic opening of malicious websites and exection of code. Active exploitation of the vulnerability is currently ongoing.
http://secunia.com/advisories/24618/. There exist multiple, local, IPv6 vulnerabilities in the Linux kernel prior to 184.108.40.206. These vulnerabilities could lead to local Denial of Service (DoS) attacks, including kernel crash. This can be exploited locally, no remote exploitation has been reported at this time.
http://secunia.com/advisories/24205/ It is recommended to upgrade to 220.127.116.11 or 18.104.22.168. These vulnerabilities include security restrictions bypass, cross site scripting, disclosure of personal data and even (possibly) system compromise.