======================================================================== The Secunia Weekly Advisory Summary 2009-05-28 - 2009-06-04 This week: 64 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Meet us at the Gartner Information Security Summit in Washington D.C. Secunia will be sponsoring and showcasing our commercial solutions at the Gartner IT Security Summit, in Washington D.C. from the 28th of June 2009 - 1st of July 2009. Come and meet our representatives at booth 36 and gain valuable insight on our Vulnerability Intelligence solutions, as well as our application scanning capabilities. Book a meeting with a Secunia representative at the Gartner IT Security Summit! Please send an email to: partners_at_private * Did you know that Secunia last year was the most active research house and is recognized as the leading Vulnerability Intelligence Provider? * Did you know that Secunia today has 1.5 million active users of the Secunia PSI. PSI download: http://secunia.com/vulnerability_scanning/personal/ Are you sure you have all latest vulnerability intelligence research required to secure your systems? Click here to request a 10 day trial now: http://secunia.com/advisories/try_vi/ ======================================================================== 2) This Week in Brief: A vulnerability has been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35314/ -- Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35091/ -- A vulnerability has been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35268/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA34924] Adobe Reader JavaScript Methods Memory Corruption 2. [SA35268] Microsoft DirectShow QuickTime Parsing Arbitrary Code Execution 3. [SA35091] Apple QuickTime Multiple Vulnerabilities 4. [SA34012] Adobe Flash Player Multiple Vulnerabilities 5. [SA28713] Facebook Photo Uploader ActiveX Control Property Handling Buffer Overflow 6. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 7. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 8. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 9. [SA33954] Microsoft Excel Two Vulnerabilities 10. [SA35314] Apple iTunes Protocol Handler Buffer Overflow Vulnerability ======================================================================== 4) This Week in Numbers During the past week 64 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 11 Secunia Advisories Unix/Linux : 25 Secunia Advisories Other : 3 Secunia Advisories Cross platform : 25 Secunia Advisories Criticality Ratings: Extremely Critical : 1 Secunia Advisory Highly Critical : 10 Secunia Advisories Moderately Critical : 33 Secunia Advisories Less Critical : 15 Secunia Advisories Not Critical : 5 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________ Visit the InfoSec News security bookstore! http://www.shopinfosecnews.orgReceived on Fri Jun 05 2009 - 02:04:44 PDT
This archive was generated by hypermail 2.2.0 : Fri Jun 05 2009 - 02:20:27 PDT