======================================================================== The Secunia Weekly Advisory Summary 2010-05-13 - 2010-05-20 This week: 49 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Stay Compliant Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE, Changelogs, Alternative Remediation Strategies, and much more provided in the Secunia Vulnerability Intelligence solutions Free Trial http://secunia.com/products/corporate/evm/trial/ ======================================================================== 2) This Week in Brief: Apple has issued an update for Java for Mac OS X. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or to compromise a user's system. http://secunia.com/advisories/39819/ -- A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. http://secunia.com/advisories/39577/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA39766] Outlook Express / Windows Mail STAT Response Integer Overflow 2. [SA39670] Apple Safari Information Disclosure and Code Execution 3. [SA38751] Adobe Shockwave Player Multiple Vulnerabilities 4. [SA38416] Microsoft Internet Explorer Local File Disclosure Vulnerabilities 5. [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities 6. [SA38547] Adobe Flash Player Domain Sandbox Bypass Vulnerability 7. [SA39828] NPDS REvolution Multiple Vulnerabilities 8. [SA39577] Microsoft Windows Canonical Display Driver Memory Corruption 9. [SA39731] Debian update for phpgroupware 10. [SA39665] phpGroupWare SQL Injection and Local File Inclusion Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 49 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 7 Secunia Advisories Unix/Linux : 7 Secunia Advisories Other : 0 Secunia Advisories Cross platform : 35 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 6 Secunia Advisories Moderately Critical : 24 Secunia Advisories Less Critical : 18 Secunia Advisories Not Critical : 1 Secunia Advisory ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _______________________________________________ Best Selling Security Books and More! Shop InfoSec News http://www.shopinfosecnews.org/Received on Thu May 20 2010 - 22:32:39 PDT
This archive was generated by hypermail 2.2.0 : Thu May 20 2010 - 22:36:13 PDT