======================================================================== The Secunia Weekly Advisory Summary 2010-03-04 - 2010-03-11 This week: 63 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Patching redefined - Free & Automatic Updating for every single PC user Unpatched programs are a primary source of IT insecurity. But due to the complex and immeasurable scope of patching, it is neglected by the majority of private users. Not a viable approach to ensure online safety - Secunia has set out aggressively to change this! Read more: http://secunia.com/blog/80/ -- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ======================================================================== 2) This Week in Brief: A vulnerability has been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system. NOTE: The vulnerability is currently being actively exploited. For more information: http://secunia.com/advisories/38860/ -- A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. For more information: http://secunia.com/advisories/38791/ -- Multiple vulnerabilities have been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system. For more information: http://secunia.com/advisories/38805/ -- Paul Craig has reported a vulnerability in Skype, which can be exploited by malicious people to bypass certain security restrictions and potentially disclose certain sensitive information. For more information: http://secunia.com/advisories/38908/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA38416] Microsoft Internet Explorer Local File Disclosure Vulnerabilities 2. [SA37584] Adobe Flash Player Multiple Vulnerabilities 3. [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities 4. [SA38511] Microsoft DirectShow AVI File Parsing Buffer Overflow Vulnerability 5. [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities 6. [SA37769] Google Chrome Multiple Vulnerabilities 7. [SA38209] Microsoft Internet Explorer Multiple Vulnerabilities 8. [SA38061] Google Chrome Stylesheet Redirection Information Disclosure 9. [SA38265] Microsoft Windows Two Privilege Escalation Vulnerabilities 10. [SA38506] Microsoft Windows TCP/IP Implementation Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 63 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 17 Secunia Advisories Unix/Linux : 24 Secunia Advisories Other : 1 Secunia Advisory Cross platform : 21 Secunia Advisories Criticality Ratings: Extremely Critical : 1 Secunia Advisory Highly Critical : 10 Secunia Advisories Moderately Critical : 22 Secunia Advisories Less Critical : 27 Secunia Advisories Not Critical : 3 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ___________________________________________________________ Register now for HITBSecConf2010 - Dubai, the premier deep-knowledge network security event in the GCC, featuring keynote speakers John Viega and Matt Watchinski! http://conference.hitb.org/hitbsecconf2010dxb/Received on Thu Mar 11 2010 - 22:12:54 PST
This archive was generated by hypermail 2.2.0 : Thu Mar 11 2010 - 22:21:31 PST