[ISN] Secunia Weekly Summary - Issue: 2009-18

From: InfoSec News <alerts_at_private>
Date: Fri, 1 May 2009 04:38:26 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-04-23 - 2009-04-30                        

                       This week: 47 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Are you missing:

* Vulnerabilities Summary Listing

Example:

[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability


* Vulnerabilities Content Listing

Example:

Windows:

[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-04-11

A vulnerability has been reported in Microsoft Data Access Components
(MDAC), which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/19583/


This intelligence is part of the Secunia Vulnerability Intelligence
Feed.

Get:
* Customised Intelligence. No more irrelevant alerts.
* Access to Secunia Support.
* Access to the Secunia vulnerability database.
* Access to updated vulnerability intelligence that you are missing out
on.

Features also include:
* XML Feed capability.
* Multiple user accounts capability.
* Ticketing System capability.

Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/

Click here to trial our solutions:
http://secunia.com/advisories/try_vi/

========================================================================
2) This Week in Brief:

A vulnerability has been reported in Mozilla Firefox, which can be
exploited by malicious people to potentially compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/34866/

 --

Arr1val has discovered two vulnerabilities in Adobe Reader, which can
be exploited by malicious people to potentially compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/34924/

 --

A vulnerability has been reported in file, which can be exploited by
malicious people to potentially compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/34881/

 --

Secunia Research has discovered a vulnerability in HP OpenView Network
Node Manager, which can be exploited by malicious people to compromise
a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/31672/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
2.  [SA34012] Adobe Flash Player Multiple Vulnerabilities
3.  [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
4.  [SA34866] Mozilla Firefox "nsTextFrame::ClearTextRun()" Memory
              Corruption
5.  [SA34758] Mozilla Firefox Multiple Vulnerabilities
6.  [SA34924] Adobe Reader for Linux JavaScript Methods Memory
              Corruption
7.  [SA33954] Microsoft Excel Two Vulnerabilities
8.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
9.  [SA23655] Microsoft XML Core Services Multiple Vulnerabilities
10. [SA34677] Microsoft Windows HTTP Services Multiple Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 47 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      5 Secunia Advisories
  Unix/Linux          :     21 Secunia Advisories
  Other               :      2 Secunia Advisories
  Cross platform      :     19 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     10 Secunia Advisories
  Moderately Critical :     17 Secunia Advisories
  Less Critical       :     13 Secunia Advisories
  Not Critical        :      7 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


--
LayerOne 2009, Information Security for the discerning professional. 
May 23-24 2009 @ The Anaheim Marriott in Anaheim, California 
Visit http://layerone.info for more information
Received on Fri May 01 2009 - 02:38:26 PDT

This archive was generated by hypermail 2.2.0 : Fri May 01 2009 - 02:48:41 PDT