[ISN] Secunia Weekly Summary - Issue: 2009-13

From: InfoSec News <alerts_at_private>
Date: Fri, 27 Mar 2009 01:02:20 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-03-19 - 2009-03-26                        

                       This week: 75 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia is pleased to announce the release of the annual Secunia report
for 2008.

Highlights from the 2008 report:
 * Vulnerability Research
 * Software Inspection Results
 * Secunia Research Highlights
 * Secunia Advisory Statistics

Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia

========================================================================
2) This Week in Brief:

Some vulnerabilities have been reported in Sun Java, which can be
exploited by malicious people to bypass certain security restrictions,
cause a DoS (Denial of Service), or potentially compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/34451/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA34012] Adobe Flash Player Multiple Vulnerabilities
2.  [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
3.  [SA34145] Mozilla Firefox Multiple Vulnerabilities
4.  [SA32991] Sun Java JDK / JRE Multiple Vulnerabilities
5.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
6.  [SA34307] Symantec Products KeyView "wp6sr.dll" Buffer Overflow
7.  [SA34411] OpenSSL Multiple Vulnerabilities
8.  [SA23655] Microsoft XML Core Services Multiple Vulnerabilities
9.  [SA34422] Linux Kernel Information Disclosure and Security Bypass
10. [SA34135] Opera Multiple Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 75 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     10 Secunia Advisories
  Unix/Linux          :     43 Secunia Advisories
  Other               :      4 Secunia Advisories
  Cross platform      :     18 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      1 Secunia Advisory  
  Highly Critical     :     17 Secunia Advisories
  Moderately Critical :     29 Secunia Advisories
  Less Critical       :     18 Secunia Advisories
  Not Critical        :     10 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/
Received on Fri Mar 27 2009 - 00:02:20 PDT

This archive was generated by hypermail 2.2.0 : Fri Mar 27 2009 - 00:07:13 PDT