[ISN] Secunia Weekly Summary - Issue: 2010-18

From: InfoSec News <alerts_at_private>
Date: Fri, 7 May 2010 02:06:59 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2010-04-29 - 2010-05-06                        

                       This week: 46 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:



Looking for a job?


Secunia is hiring skilled researchers and talented developers.


http://secunia.com/company/jobs/



========================================================================
2) This Week in Brief:

A vulnerability has been reported in Wireshark, which can be exploited
by malicious people to cause a DoS (Denial of Service).

http://secunia.com/advisories/39661/

 --

Some vulnerabilities have been reported in Adobe Photoshop CS4, which
can be exploited by malicious people to compromise a user's system.

http://secunia.com/advisories/39711/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA39590] Opera Asynchronous Content Modification Uninitialised
              Memory Vulnerability
2.  [SA39651] Google Chrome Multiple Vulnerabilities
3.  [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
4.  [SA39603] Microsoft SharePoint Server / SharePoint Services
              "help.aspx" Cross-Site Scripting
5.  [SA38416] Microsoft Internet Explorer Local File Disclosure
              Vulnerabilities
6.  [SA39446] Internet Download Manager FTP Buffer Overflow
              Vulnerability
7.  [SA38547] Adobe Flash Player Domain Sandbox Bypass Vulnerability
8.  [SA39650] Red Hat update for xorg-x11-server
9.  [SA39639] Ubuntu update for netpbm-free
10. [SA39566] Ubuntu update for postgresql

========================================================================
4) This Week in Numbers

During the past week 46 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     10 Secunia Advisories
  Unix/Linux          :      8 Secunia Advisories
  Other               :      0 Secunia Advisories
  Cross platform      :     28 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      9 Secunia Advisories
  Moderately Critical :     16 Secunia Advisories
  Less Critical       :     17 Secunia Advisories
  Not Critical        :      4 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________
Best Selling Security Books and More!
Shop InfoSec News
http://www.shopinfosecnews.org/ 
Received on Fri May 07 2010 - 00:06:59 PDT

This archive was generated by hypermail 2.2.0 : Fri May 07 2010 - 00:13:04 PDT