[ISN] Secunia Weekly Summary - Issue: 2010-34

From: InfoSec News <alerts_at_private>
Date: Fri, 27 Aug 2010 00:57:30 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2010-08-19 - 2010-08-26                        

                       This week: 76 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:


Secunia wins the 2010 Global Frost & Sullivan Award for Customer Value
Enhancement.

"Secunia’s penetration rate in the vulnerability research market is
directly attributable to its firm commitment towards enhancing the
value that customers derive from the company’s product and services,"
says Frost & Sullivan Industry Analyst Chris Rodriguez.

Download the complete research report by Frost & Sullivan at:
http://secunia.com/gfx/pdf/Frost_Sullivan_Secunia_2010.pdf


========================================================================
2) This Week in Brief:

List of products vulnerable to insecure library loading
vulnerabilities:
http://secunia.com/_%22insecure%20library%20loading%22

The list is continuously updated as we confirm the vulnerability
reports so check back regularly too see if any of your apps are
affected.

 --

Multiple vulnerabilities have been reported in Google Chrome, where one
has an unknown impact and others can be exploited by malicious people to
conduct spoofing attacks and compromise a user's system.

http://secunia.com/advisories/41014

 --

Multiple vulnerabilities have been reported in Adobe Shockwave Player,
which can be exploited by malicious people to compromise a user's
system.

http://secunia.com/advisories/41065

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA40907] Adobe Flash Player Multiple Vulnerabilities
2.  [SA40766] Adobe Reader/Acrobat Multiple Vulnerabilities
3.  [SA40729] QuickTime Player Streaming Debug Error Logging Buffer
              Overflow
4.  [SA40917] Google Chrome Update for Flash Plugin
5.  [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6.  [SA40870] Microsoft Windows win32k.sys Driver "CreateDIBPalette()"
              Buffer Overflow
7.  [SA24314] Internet Explorer Charset Inheritance Cross-Site
              Scripting Vulnerability
8.  [SA40034] Adobe Reader/Acrobat Multiple Vulnerabilities
9.  [SA40936] Microsoft Windows Cinepak Codec Decompression
              Vulnerability
10. [SA40872] Microsoft .NET Framework / Silverlight Code Execution
              Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 76 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     32 Secunia Advisories
  Unix/Linux          :     28 Secunia Advisories
  Other               :      4 Secunia Advisories
  Cross platform      :     12 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     33 Secunia Advisories
  Moderately Critical :     13 Secunia Advisories
  Less Critical       :     25 Secunia Advisories
  Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________________      
Subscribe to InfoSec News - www.infosecnews.org
http://www.infosecnews.org/mailman/listinfo/isn
Received on Thu Aug 26 2010 - 22:57:30 PDT

This archive was generated by hypermail 2.2.0 : Thu Aug 26 2010 - 23:03:46 PDT