[ISN] Secunia Weekly Summary - Issue: 2010-04

From: InfoSec News <alerts_at_private>
Date: Mon, 1 Feb 2010 00:48:04 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2010-01-21 - 2010-01-28                        

                       This week: 56 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia CSI 4.0
 - integrated with Microsoft WSUS for 3rd Party Patch Management

Secunia is currently conducting beta testing of the new patch
management capabilities in cooperation with selected customers and
partners.

Public beta testing of Secunia CSI 4.0 integrated with Microsoft WSUS
for 3rd Party Patch Management is expected in mid-February, 2010.

You can sign-up now to participate.

Read more:
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_party_patching/

Sign up:
http://secunia.com/vulnerability_scanning/corporate/csi_beta_microsoft_wsus_integration/

========================================================================
2) This Week in Brief:

Chrome vulnerability discovered by Secunia:
http://secunia.com/secunia_research/2009-65/

--

Some vulnerabilities and weaknesses have been reported in Google
Chrome, where some have unknown impacts and others can be exploited by
malicious people to disclose potentially sensitive information, bypass
certain security restrictions, or compromise a user's system.

For more information:
http://secunia.com/advisories/37769/

--

A vulnerability has been discovered in Google Chrome, which can be
exploited by malicious people to disclose potentially sensitive
information.

For more information:
http://secunia.com/advisories/38061/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA38209] Microsoft Internet Explorer Multiple
              Vulnerabilities
2.  [SA24314] Internet Explorer Charset Inheritance
              Cross-Site Scripting Vulnerability
3.  [SA37584] Adobe Flash Player Multiple Vulnerabilities
4.  [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities
5.  [SA37769] Google Chrome Multiple Vulnerabilities
6.  [SA38061] Google Chrome Stylesheet Redirection Information
              Disclosure
7.  [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities
8.  [SA38265] Microsoft Windows "KiTrap0D" Privilege Escalation
              Vulnerability
9.  [SA37888] Adobe Shockwave Player 3D Model Parsing Eight
              Vulnerabilities
10. [SA37699] Mozilla Firefox Multiple Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 56 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      2 Secunia Advisories
  Unix/Linux          :     28 Secunia Advisories
  Other               :      3 Secunia Advisories
  Cross platform      :     23 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      6 Secunia Advisories
  Moderately Critical :     21 Secunia Advisories
  Less Critical       :     24 Secunia Advisories
  Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org
Received on Sun Jan 31 2010 - 22:48:04 PST

This archive was generated by hypermail 2.2.0 : Sun Jan 31 2010 - 22:54:38 PST