======================================================================== The Secunia Weekly Advisory Summary 2009-09-10 - 2009-09-17 This week: 72 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Fortune 500 companies turn to Secunia when a vulnerability poses a critical threat to their infrastructure. Our Customer Support Center provides our customers with the best support on how to eliminate vulnerability threats. Do you have a provider you can contact when the threat is already in your network? Click here to learn more about our capabilities: http://secunia.com/gfx/Presentation/index.html ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system. For more information, refer to: http://secunia.com/advisories/36762/ -- Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to potentially compromise a user's system. For more information, refer to: http://secunia.com/advisories/36627/ -- Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a vulnerable system. For more information, refer to: http://secunia.com/advisories/36671/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA36649] Mozilla Firefox Temporary File Download Manipulation Security Issue 2. [SA35948] Adobe Flash Player Multiple Vulnerabilities 3. [SA36671] Mozilla Firefox Multiple Vulnerabilities 4. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 5. [SA36627] Apple QuickTime Multiple Vulnerabilities 6. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 7. [SA36597] Windows 2000 / XP TCP/IP Window Size Denial of Service Vulnerabilities 8. [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution 9. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 10. [SA36603] Microsoft Windows TCP/IP Implementation Multiple Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 72 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 8 Secunia Advisories Unix/Linux : 30 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 32 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 18 Secunia Advisories Moderately Critical : 24 Secunia Advisories Less Critical : 27 Secunia Advisories Not Critical : 3 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Fri Sep 18 2009 - 02:06:25 PDT
This archive was generated by hypermail 2.2.0 : Fri Sep 18 2009 - 02:14:18 PDT