======================================================================== The Secunia Weekly Advisory Summary 2009-07-23 - 2009-07-30 This week: 101 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: New Blog: Adobe 0-Day: Are you affected? As highlighted on multiple news sites around the world, the report of a zero-day vulnerability in some very popular Adobe software (Reader and Flash Player) has been published. It is very likely that you have Adobe Flash Player and Adobe Reader installed, as statistics from our Secunia PSI shows, however, rather than relying on chance, why not scan your PC with the free Secunia PSI and verify if you are vulnerable or not? Read More: http://secunia.com/blog/59/ ======================================================================== 2) This Week in Brief: Three vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35962/ -- Some vulnerabilities have been reported in Microsoft Visual Studio, which can be exploited by malicious people to potentially bypass security features, gain knowledge of sensitive information, or compromise applications built using ATL (Active Template Library). For more information, refer to: http://secunia.com/advisories/35967/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA35948] Adobe Flash Player Multiple Vulnerabilities 2. [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution 3. [SA35914] Mozilla Firefox Multiple Vulnerabilities 4. [SA36001] Mozilla Firefox URL Spoofing Security Issue 5. [SA34012] Adobe Flash Player Multiple Vulnerabilities 6. [SA35853] Sun Java JDK / JRE XML Signature HMAC Truncation Spoofing 7. [SA35962] Internet Explorer Three Vulnerabilities 8. [SA35798] Mozilla Firefox Two Vulnerabilities 9. [SA35978] Kaspersky Internet Security / Anti-Virus Security Bypass Vulnerability 10. [SA36037] VLC Media Player "real_get_rdt_chunk()" Buffer Overflow ======================================================================== 4) This Week in Numbers During the past week 101 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 8 Secunia Advisories Unix/Linux : 40 Secunia Advisories Other : 3 Secunia Advisories Cross platform : 50 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 14 Secunia Advisories Moderately Critical : 50 Secunia Advisories Less Critical : 32 Secunia Advisories Not Critical : 5 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== To unsubscribe click following link: http://secunia.com/summary/unsubscribe/?email=submissions%40infosecnews.org ======================================================================== __________________________ Subscribe to InfoSec News http://www.infosecnews.orgReceived on Mon Aug 03 2009 - 04:43:06 PDT
This archive was generated by hypermail 2.2.0 : Mon Aug 03 2009 - 04:51:48 PDT