[ISN] Secunia Weekly Summary - Issue: 2009-16

From: InfoSec News <alerts_at_private>
Date: Fri, 17 Apr 2009 04:18:10 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-04-09 - 2009-04-16                        

                       This week: 75 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia is hiring.

Development:
http://secunia.com/corporate/jobs/open_positions_php_html_css_js_xml_ajax_ui
http://secunia.com/corporate/jobs/open_positions_c_programmer

Security:
http://secunia.com/corporate/jobs/open_positions_hardcore_disassembler
http://secunia.com/corporate/jobs/open_positions_secunia_security_specialist

Sales:
http://secunia.com/corporate/jobs/open_positions_sales_manager
http://secunia.com/corporate/jobs/open_positions_business_sales_developer
http://secunia.com/corporate/jobs/open_positions_security_consultant
http://secunia.com/corporate/jobs/open_positions_international_account_manager


========================================================================
2) This Week in Brief:

Microsoft Security Bulletins for April 2009.

For more information, refer to:
http://secunia.com/advisories/34687/
http://secunia.com/advisories/34678/
http://secunia.com/advisories/34677/
http://secunia.com/advisories/34665/
http://secunia.com/advisories/32997/

 --

Some vulnerabilities have been reported in Oracle BEA WebLogic
products. One has an unknown impact, others can be exploited by
malicious users to gain escalated privileges or compromise a vulnerable
system, and by malicious people to bypass certain security restrictions,
disclose sensitive information, cause a DoS (Denial of Service), or
compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/34074/

 --

Secunia Research has discovered a vulnerability in DivX Web Player,
which can be exploited by malicious people to compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/33196/

 --

Some vulnerabilities have been reported in Mac OS X, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or to gain escalated privileges, and potentially by malicious people to
cause a DoS (Denial of Service) or compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/34424/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
2.  [SA34012] Adobe Flash Player Multiple Vulnerabilities
3.  [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
4.  [SA34677] Microsoft Windows HTTP Services Multiple Vulnerabilities
5.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
6.  [SA34612] ClamAV UPack Denial of Service and "cli_url_canon()"
              Buffer Overflow
7.  [SA34678] Microsoft Internet Explorer Multiple Vulnerabilities
8.  [SA34572] PowerPoint Unspecified Code Execution Vulnerability
9.  [SA33196] DivX Web Player Stream Format Chunk Buffer Overflow
10. [SA34665] Microsoft DirectShow MJPEG Decompression Vulnerability

========================================================================
4) This Week in Numbers

During the past week 75 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     19 Secunia Advisories
  Unix/Linux          :     33 Secunia Advisories
  Other               :      1 Secunia Advisory  
  Cross platform      :     22 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     14 Secunia Advisories
  Moderately Critical :     35 Secunia Advisories
  Less Critical       :     18 Secunia Advisories
  Not Critical        :      8 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/
Received on Fri Apr 17 2009 - 02:18:10 PDT

This archive was generated by hypermail 2.2.0 : Fri Apr 17 2009 - 02:24:08 PDT