[ISN] Secunia Weekly Summary - Issue: 2009-35

From: InfoSec News <alerts_at_private>
Date: Fri, 28 Aug 2009 04:01:30 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-08-20 - 2009-08-27                        

                       This week: 77 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia PSI now available in 42 languages!

100 days ago, Secunia CEO Niels Henrik Rasmussen promised "40 languages
in 100 days" for the Secunia PSI. Since this day Secunia as well as
members of the Secunia PSI community have been working hard to keep the
promise. We would like to extend our gratitude, not only to the many
translators that made this possible, but also to the many requests we
had to turn down because the translation of their language already was
in progress.

Read More:
http://secunia.com/blog/61/

========================================================================
2) This Week in Brief:

Some vulnerabilities have been reported in Google Chrome, which can be
exploited by malicious people to potentially conduct spoofing attacks,
disclose sensitive information, or potentially compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/36417/

 --

A vulnerability has been reported in various Symantec products, which
can be exploited by malicious people to compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/36421/

 --

A vulnerability has been reported in Lotus Notes, which can be
exploited by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/36472/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA35948] Adobe Flash Player Multiple Vulnerabilities
2.  [SA35853] Sun Java JDK / JRE Multiple Vulnerabilities
3.  [SA24314] Internet Explorer Charset Inheritance Cross-Site
              Scripting Vulnerability
4.  [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution
5.  [SA36159] Sun Java JDK / JRE Multiple Vulnerabilities
6.  [SA36001] Mozilla Firefox Multiple Vulnerabilities
7.  [SA28713] Facebook Photo Uploader ActiveX Control Property Handling
              Buffer Overflow
8.  [SA36229] Microsoft Remote Desktop Connection Two Vulnerabilities
9.  [SA24900] Akamai Download Manager ActiveX Control Buffer Overflow
              Vulnerabilities
10. [SA36187] Microsoft Windows Various Components ATL Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 77 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     14 Secunia Advisories
  Unix/Linux          :     25 Secunia Advisories
  Other               :      1 Secunia Advisory  
  Cross platform      :     37 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     16 Secunia Advisories
  Moderately Critical :     29 Secunia Advisories
  Less Critical       :     27 Secunia Advisories
  Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org
Received on Fri Aug 28 2009 - 02:01:30 PDT

This archive was generated by hypermail 2.2.0 : Fri Aug 28 2009 - 02:18:04 PDT