======================================================================== The Secunia Weekly Advisory Summary 2009-08-13 - 2009-08-20 This week: 71 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Do you speak binary? If you do, then you may be interested in our monthly blog where we elaborate over our binary analysis of certain vulnerabilities: http://secunia.com/blog/60/ If you are truly fluent in "binary" and love to pull your software apart to see how it works, then we may have an interesting job for you: http://secunia.com/corporate/jobs/open_positions_vulnerability_analyst_trainee http://secunia.com/corporate/jobs/open_positions_senior_reverse_engineer ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Adobe Flex, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass security features, gain knowledge of sensitive information, or compromise a user's system. For more information, refer to: http://secunia.com/advisories/36374/ -- A vulnerability has been reported in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to cause a DoS (Denial of Service). For more information, refer to: http://secunia.com/advisories/36373/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA35948] Adobe Flash Player Multiple Vulnerabilities 2. [SA35853] Sun Java JDK / JRE Multiple Vulnerabilities 3. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 4. [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution 5. [SA36159] Sun Java JDK / JRE Multiple Vulnerabilities 6. [SA36001] Mozilla Firefox Multiple Vulnerabilities 7. [SA28713] Facebook Photo Uploader ActiveX Control Property Handling Buffer Overflow 8. [SA36229] Microsoft Remote Desktop Connection Two Vulnerabilities 9. [SA24900] Akamai Download Manager ActiveX Control Buffer Overflow Vulnerabilities 10. [SA36187] Microsoft Windows Various Components ATL Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 71 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 10 Secunia Advisories Unix/Linux : 41 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 18 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 15 Secunia Advisories Moderately Critical : 26 Secunia Advisories Less Critical : 26 Secunia Advisories Not Critical : 4 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ________________________________________ Subscribe to InfoSec News http://www.infosecnews.orgReceived on Fri Aug 21 2009 - 02:31:29 PDT
This archive was generated by hypermail 2.2.0 : Fri Aug 21 2009 - 02:36:17 PDT