======================================================================== The Secunia Weekly Advisory Summary 2010-05-20 - 2010-05-27 This week: 47 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Stay Compliant Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE, Changelogs, Alternative Remediation Strategies, and much more provided in the Secunia Vulnerability Intelligence solutions Free Trial http://secunia.com/products/corporate/evm/trial/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Adobe Photoshop CS4, which can be exploited by malicious people to compromise a user's system. http://secunia.com/advisories/39934 -- Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct spoofing attacks or bypass certain security restrictions. http://secunia.com/advisories/39882 -- Some vulnerabilities have been reported in Cisco Network Building Mediator, which can be exploited by malicious users to gain escalated privileges and by malicious people to gain knowledge of sensitive information. http://secunia.com/advisories/39904 ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA39916] Kingsoft WebShield KAVSafe.sys IOCTL Handling Vulnerability 2. [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities 3. [SA38416] Microsoft Internet Explorer Local File Disclosure Vulnerabilities 4. [SA38547] Adobe Flash Player Domain Sandbox Bypass Vulnerability 5. [SA39651] Google Chrome Multiple Vulnerabilities 6. [SA39272] Adobe Reader / Acrobat Multiple Vulnerabilities 7. [SA38751] Adobe Shockwave Player Multiple Vulnerabilities 8. [SA39670] Apple Safari Information Disclosure and Code Execution 9. [SA39577] Microsoft Windows Canonical Display Driver Memory Corruption 10. [SA38860] Internet Explorer Multiple Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 47 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 7 Secunia Advisories Unix/Linux : 20 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 18 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 5 Secunia Advisories Moderately Critical : 20 Secunia Advisories Less Critical : 18 Secunia Advisories Not Critical : 4 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _______________________________________________ Best Selling Security Books and More! Shop InfoSec News http://www.shopinfosecnews.org/Received on Thu May 27 2010 - 22:30:04 PDT
This archive was generated by hypermail 2.2.0 : Thu May 27 2010 - 23:01:31 PDT