======================================================================== The Secunia Weekly Advisory Summary 2009-10-08 - 2009-10-15 This week: 48 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: The Secunia Vulnerability Intelligence Feed focuses on enabling centralised security teams and relevant security personnel, to receive the latest validated vulnerability and threat intelligence, provided from the Secunia research team. Enabling you to distribute the intelligence through your existing communication channels (Mailing-lists) already in-place within your organisation. Features include: * XML Capability - Dynamic or 24 hour XML feed * Vulnerability Database * E-mail/SMS alerting Click here to learn more: http://secunia.com/gfx/pdf/VIF.pdf Try it: http://secunia.com/advisories/try_vi Did you know that Secunia is GSA approved? For further information please see: GSA Pricing - GSA Contract # GS-35F-0858N ======================================================================== 2) This Week in Brief: Microsoft has released their security bulletins for October. For more information, refer to: http://secunia.com/advisories/37002/ http://secunia.com/advisories/37007/ http://secunia.com/advisories/37001/ http://secunia.com/advisories/36938/ http://secunia.com/advisories/36944/ http://secunia.com/advisories/37006/ http://secunia.com/advisories/36979/ http://secunia.com/advisories/37008/ http://secunia.com/advisories/37000/ http://secunia.com/advisories/36999/ http://secunia.com/advisories/37005/ http://secunia.com/advisories/36997/ -- Multiple vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or compromise a user's system. For more information, refer to: http://secunia.com/advisories/36983/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA36983] Adobe Reader/Acrobat Arbitrary Multiple Vulnerabilities 2. [SA35948] Adobe Flash Player Multiple Vulnerabilities 3. [SA36649] Mozilla Firefox Temporary File Download Manipulation Security Issue 4. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 5. [SA35949] Adobe Reader/Acrobat SWF Content Arbitrary Code Execution 6. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 7. [SA37007] Microsoft Products GDI+ Multiple Vulnerabilities 8. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 9. [SA36988] VMware Authorization Service Denial of Service Vulnerability 10. [SA36979] Microsoft Internet Explorer Multiple Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 48 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 16 Secunia Advisories Unix/Linux : 24 Secunia Advisories Other : 0 Secunia Advisories Cross platform : 8 Secunia Advisories Criticality Ratings: Extremely Critical : 1 Secunia Advisory Highly Critical : 14 Secunia Advisories Moderately Critical : 17 Secunia Advisories Less Critical : 12 Secunia Advisories Not Critical : 4 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Thu Oct 15 2009 - 23:28:49 PDT
This archive was generated by hypermail 2.2.0 : Thu Oct 15 2009 - 23:48:15 PDT