[ISN] Secunia Weekly Summary - Issue: 2009-41

From: InfoSec News <alerts_at_private>
Date: Fri, 9 Oct 2009 04:21:42 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-10-01 - 2009-10-08                        

                       This week: 42 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

The Secunia Vulnerability Intelligence Feed focuses on enabling
centralised security teams and relevant security personnel, to receive
the latest validated vulnerability and threat intelligence, provided
from the Secunia research team.

Enabling you to distribute the intelligence through your existing
communication channels (Mailing-lists) already in-place within your
organisation.

Features include:
* XML Capability - Dynamic or 24 hour XML feed
* Vulnerability Database
* E-mail/SMS alerting


Click here to learn more:
http://secunia.com/gfx/pdf/VIF.pdf

Try it:
http://secunia.com/advisories/try_vi

Did you know that Secunia is GSA approved?

For further information please see:
GSA Pricing - GSA Contract # GS-35F-0858N

========================================================================
2) This Week in Brief:

pyrokinesis has discovered a vulnerability in Google Apps, which can be
exploited by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/36924/

 --

bruiser has discovered a vulnerability in IBM Informix Client Software
Development Kit (CSDK) and IBM Informix Connect, which can be exploited
by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/36949/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA36649] Mozilla Firefox Temporary File Download Manipulation
              Security Issue
2.  [SA35948] Adobe Flash Player Multiple Vulnerabilities
3.  [SA36671] Mozilla Firefox Multiple Vulnerabilities
4.  [SA24314] Internet Explorer Charset Inheritance Cross-Site
              Scripting Vulnerability
5.  [SA36627] Apple QuickTime Multiple Vulnerabilities
6.  [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
7.  [SA36597] Windows 2000 / XP TCP/IP Window Size Denial of Service
              Vulnerabilities
8.  [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution
9.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
10. [SA36603] Microsoft Windows TCP/IP Implementation Multiple
              Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 42 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     11 Secunia Advisories
  Unix/Linux          :     20 Secunia Advisories
  Other               :      5 Secunia Advisories
  Cross platform      :      6 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      3 Secunia Advisories
  Moderately Critical :     13 Secunia Advisories
  Less Critical       :     23 Secunia Advisories
  Not Critical        :      3 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org
Received on Fri Oct 09 2009 - 02:21:42 PDT

This archive was generated by hypermail 2.2.0 : Fri Oct 09 2009 - 02:30:48 PDT