======================================================================== The Secunia Weekly Advisory Summary 2010-01-07 - 2010-01-14 This week: 63 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Accurate Vulnerability Scanning No more false positives, no more false negatives http://secunia.com/vulnerability_scanning/ ======================================================================== 2) This Week in Brief: Secunia Research has discovered a vulnerability in Windows XP, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/27105/ -- Some vulnerabilities have been reported in Oracle Database, which can be exploited by malicious users to manipulate certain data, disclose potentially sensitive information, or compromise a vulnerable system and by malicious people to compromise a vulnerable system. For more information, refer to: http://secunia.com/advisories/38027/ -- A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. For more information, refer to: http://secunia.com/advisories/35457/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA37584] Adobe Flash Player Multiple Vulnerabilities 2. [SA37690] Adobe Reader/Acrobat Memory Corruption Vulnerabilities 3. [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities 4. [SA37831] Microsoft IIS ASP Multiple Extensions Security Bypass 5. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 6. [SA36983] Adobe Reader/Acrobat Multiple Vulnerabilities 7. [SA37699] Mozilla Firefox Multiple Vulnerabilities 8. [SA28713] Facebook Photo Uploader ActiveX Control Property Handling Buffer Overflow 9. [SA35948] Adobe Flash Player Multiple Vulnerabilities 10. [SA37398] Kaspersky Anti-Virus 2010 Denial of Service and Privilege Escalation ======================================================================== 4) This Week in Numbers During the past week 63 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 6 Secunia Advisories Unix/Linux : 27 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 28 Secunia Advisories Criticality Ratings: Extremely Critical : 1 Secunia Advisory Highly Critical : 12 Secunia Advisories Moderately Critical : 14 Secunia Advisories Less Critical : 35 Secunia Advisories Not Critical : 1 Secunia Advisory ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Fri Jan 15 2010 - 07:38:20 PST
This archive was generated by hypermail 2.2.0 : Fri Jan 15 2010 - 07:44:31 PST