[ISN] Secunia Weekly Summary - Issue: 2010-05

From: InfoSec News <alerts_at_private>
Date: Mon, 8 Feb 2010 00:30:30 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2010-01-28 - 2010-02-04                        

                       This week: 60 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia CSI 4.0
 - integrated with Microsoft WSUS for 3rd Party Patch Management

Secunia is currently conducting beta testing of the new patch
management capabilities in cooperation with selected customers and
partners.

Public beta testing of Secunia CSI 4.0 integrated with Microsoft WSUS
for 3rd Party Patch Management is expected in mid-February, 2010.

You can sign-up now to participate.

Read more:
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_party_patching/

Sign up:
http://secunia.com/vulnerability_scanning/corporate/csi_beta_microsoft_wsus_integration/

========================================================================
2) This Week in Brief:

Some vulnerabilities and weaknesses have been reported in Apple iPhone
and iPod touch, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, or
potentially compromise a user's system.

For more information:
http://secunia.com/advisories/38362/

--

Two vulnerabilities have been reported in Internet Explorer, which can
be exploited by malicious people to disclose sensitive information.

For more information:
http://secunia.com/advisories/38416/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA38209] Microsoft Internet Explorer Multiple
              Vulnerabilities
2.  [SA24314] Internet Explorer Charset Inheritance
              Cross-Site Scripting Vulnerability
3.  [SA37584] Adobe Flash Player Multiple Vulnerabilities
4.  [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities
5.  [SA37769] Google Chrome Multiple Vulnerabilities
6.  [SA38061] Google Chrome Stylesheet Redirection Information
              Disclosure
7.  [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities
8.  [SA38265] Microsoft Windows "KiTrap0D" Privilege Escalation
              Vulnerability
9.  [SA37888] Adobe Shockwave Player 3D Model Parsing Eight
              Vulnerabilities
10. [SA37699] Mozilla Firefox Multiple Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 60 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      6 Secunia Advisories
  Unix/Linux          :     16 Secunia Advisories
  Other               :      3 Secunia Advisories
  Cross platform      :     35 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      7 Secunia Advisories
  Moderately Critical :     20 Secunia Advisories
  Less Critical       :     28 Secunia Advisories
  Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org
Received on Sun Feb 07 2010 - 22:30:30 PST

This archive was generated by hypermail 2.2.0 : Sun Feb 07 2010 - 22:36:59 PST