======================================================================== The Secunia Weekly Advisory Summary 2010-09-23 - 2010-09-30 This week: 63 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: In one week, Secunia receives five awards from a number of recognised industry players: Frost & Sullivan, Computerworld Denmark, Børsen, and OTA. Read more at: http://secunia.com/blog/139/ ======================================================================== 2) This Week in Brief: Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. -- Multiple vulnerabilities have been reported in MPlayer, which can be exploited by malicious people to compromise a user's system. http://secunia.com/advisories/41645/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA41434] Adobe Flash Player Unspecified Code Execution Vulnerability 2. [SA41340] Adobe Reader / Acrobat SING "uniqueName" Buffer Overflow Vulnerability 3. [SA41435] Adobe Reader/Acrobat Flash Player Unspecified Code Execution Vulnerability 4. [SA41244] Mozilla Firefox NSS Certificate IP Address Wildcard Matching Vulnerability 5. [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities 6. [SA41297] Mozilla Firefox Multiple Vulnerabilities 7. [SA41409] Microsoft ASP.NET Cryptographic Padding Oracle Information Disclosure 8. [SA41525] Microsoft Windows Unspecified Privilege Escalation Vulnerability 9. [SA41213] Apple QuickTime QTPlugin.ocx Input Validation Vulnerability 10. [SA41574] VMware Update for Workstation and Player ======================================================================== 4) This Week in Numbers During the past week 63 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 6 Secunia Advisories Unix/Linux : 28 Secunia Advisories Other : 1 Secunia Advisory Cross platform : 28 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 7 Secunia Advisories Moderately Critical : 20 Secunia Advisories Less Critical : 35 Secunia Advisories Not Critical : 1 Secunia Advisory ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _______________________________________________________ Subscribe to InfoSec News - www.infosecnews.org http://www.infosecnews.org/mailman/listinfo/isnReceived on Thu Sep 30 2010 - 23:52:23 PDT
This archive was generated by hypermail 2.2.0 : Thu Sep 30 2010 - 23:57:24 PDT