======================================================================== The Secunia Weekly Advisory Summary 2009-10-22 - 2009-10-29 This week: 69 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Blog: Secunia CSI 3.0 - Final The Public Beta of the Secunia Corporate Software Inspector (CSI) 3.0 has ended in accordance with our previously announced release schedule, and the final version of the Secunia CSI 3.0 is now available for download. A huge thanks goes out to the over 3,000 people who participated in the Secunia CSI 3.0 Public Beta, which compared to last year is extremely great, the public beta of the previous version had 1,600 participants. Read More: http://secunia.com/blog/65/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system. For more information, refer to: http://secunia.com/advisories/36711/ -- Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to disclose sensitive information, conduct spoofing attacks, or compromise a user's system. For more information, refer to: http://secunia.com/advisories/37182/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA36983] Adobe Reader/Acrobat Multiple Vulnerabilities 2. [SA35948] Adobe Flash Player Multiple Vulnerabilities 3. [SA37007] Microsoft Products GDI+ Multiple Vulnerabilities 4. [SA36649] Mozilla Firefox Temporary File Download Manipulation Security Issue 5. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 6. [SA36979] Microsoft Internet Explorer Multiple Vulnerabilities 7. [SA37049] Foxit Reader Firefox Plugin Memory Corruption Vulnerability 8. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 9. [SA37055] VMware Products DHCP and JRE Multiple Vulnerabilities 10. [SA37006] Microsoft .NET Framework Multiple Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 69 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 8 Secunia Advisories Unix/Linux : 30 Secunia Advisories Other : 4 Secunia Advisories Cross platform : 27 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 11 Secunia Advisories Moderately Critical : 23 Secunia Advisories Less Critical : 30 Secunia Advisories Not Critical : 5 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Fri Oct 30 2009 - 01:01:06 PDT
This archive was generated by hypermail 2.2.0 : Fri Oct 30 2009 - 01:13:12 PDT