[ISN] Secunia Weekly Summary - Issue: 2010-06

From: InfoSec News <alerts_at_private>
Date: Mon, 15 Feb 2010 00:48:01 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2010-02-04 - 2010-02-11                        

                       This week: 68 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia has launched a new web site:
http://secunia.com/

Check it out and post your comments in the forum:
http://secunia.com/community/forum/open_discussions/

========================================================================
2) This Week in Brief:

Microsoft has released their monthly security bulletins for February.

For more information:
http://secunia.com/advisories/38500/
http://secunia.com/advisories/38493/
http://secunia.com/advisories/36634/
http://secunia.com/advisories/38508/
http://secunia.com/advisories/35115/
http://secunia.com/advisories/38503/
http://secunia.com/advisories/38511/
http://secunia.com/advisories/38510/
http://secunia.com/advisories/38501/
http://secunia.com/advisories/38506/
http://secunia.com/advisories/38481/
http://secunia.com/advisories/38509/
http://secunia.com/advisories/38512/

--

Some vulnerabilities have been reported in Google Chrome, which can be
exploited by malicious people to disclose sensitive information,
manipulate certain data, or potentially compromise a user's system.

For more information:
http://secunia.com/advisories/38545/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA38416] Microsoft Internet Explorer Local File Disclosure
              Vulnerabilities
2.  [SA37584] Adobe Flash Player Multiple Vulnerabilities
3.  [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities
4.  [SA38511] Microsoft DirectShow AVI File Parsing Buffer Overflow
              Vulnerability
5.  [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities
6.  [SA37769] Google Chrome Multiple Vulnerabilities
7.  [SA38209] Microsoft Internet Explorer Multiple Vulnerabilities
8.  [SA38061] Google Chrome Stylesheet Redirection Information
              Disclosure
9.  [SA38265] Microsoft Windows Two Privilege Escalation
              Vulnerabilities
10. [SA38506] Microsoft Windows TCP/IP Implementation Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 68 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     16 Secunia Advisories
  Unix/Linux          :     16 Secunia Advisories
  Other               :      5 Secunia Advisories
  Cross platform      :     31 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     16 Secunia Advisories
  Moderately Critical :     27 Secunia Advisories
  Less Critical       :     21 Secunia Advisories
  Not Critical        :      4 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org
Received on Sun Feb 14 2010 - 22:48:01 PST

This archive was generated by hypermail 2.2.0 : Sun Feb 14 2010 - 22:53:32 PST