http://docs.info.apple.com/article.html?artnum=305391 - This is the second security update in as many months from Apple targetting Mac OS 10.3.9 through 10.4.9. This update fixes various vulnerabilities in the Macintosh operating system and related applications. There has been one IAS related report of difficulty with this update that required multiple reboots to resolve. It is recommended that this patch be tested and your users updated about the issues.
http://secunia.com/cve_reference/CVE-2007-1745/ http://secunia.com/cve_reference/CVE-2007-1997/ - Two vulnerabilities have been discovered in versions of clamav prior to 0.90.2 that could lead to compromising the system or a denial of service attack. It is suggested that you update to version 0.90.2.
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1 - It appears that a vulnerability in Mozilla 1.7 on Solaris 8-10 may allow malicious people to compromise a users system. It has been theorized that Mozilla 1.4 may also be vulnerable. The solution has been suggested to apply patches 119115-25 or 119116-25.
http://www.us-cert.gov/cas/techalerts/TA07-072A.html - It appears that multiple vulnerabilities are present in versions of Mac OS X 10.3.9 up to version prior to 10.4.9. The most serious of these includes a remote exploitation. It is recommended to patch to the latest release of Mac OS X to avoid exploitation.
http://www.kb.cert.org/vuls/id/191609 - It appears that a buffer overflow vulnerability is exploitable in using animated cursors that can be found on various websites and in emails. This affects versions of Microsoft Windows 2000, XP and Vista. The vulnerability allows for automatic opening of malicious websites and exection of code. Active exploitation of the vulnerability is currently ongoing.
http://secunia.com/advisories/24618/. There exist multiple, local, IPv6 vulnerabilities in the Linux kernel prior to 126.96.36.199. These vulnerabilities could lead to local Denial of Service (DoS) attacks, including kernel crash. This can be exploited locally, no remote exploitation has been reported at this time.
http://secunia.com/advisories/24205/ It is recommended to upgrade to 188.8.131.52 or 184.108.40.206. These vulnerabilities include security restrictions bypass, cross site scripting, disclosure of personal data and even (possibly) system compromise.
http://madwifi.org/wiki/news/20061207/release-0-9-2-1-fixes-critical-sec... This affects Linux computers that use the madwifi driver for wireless cards. These drivers are typically used for wireless adapters using the Atheros chipset.