======================================================================== The Secunia Weekly Advisory Summary 2011-01-20 - 2011-01-27 This week: 82 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Make a date with Secunia @ the RSA Conference 2011, USA Register now to get a free expo pass to the exhibit hall: http://secunia.com/company/events/rsa_2011/ ======================================================================== 2) This Week in Brief: Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. -- Two weaknesses and some vulnerabilities have been reported in Opera, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, and compromise a user's system. Read more: http://secunia.com/advisories/43023/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA42850] Google Chrome Multiple Vulnerabilities 2. [SA31519] AWStats URL Cross-Site Scripting Vulnerability 3. [SA19725] AWStats Multiple Vulnerabilities 4. [SA42779] Microsoft Windows Thumbnail Bitmap Parsing Buffer Overflow 5. [SA41917] Adobe Flash Player Multiple Vulnerabilities 6. [SA42510] Internet Explorer CSS Import Rule Processing Use-After-Free Vulnerability 7. [SA41810] VLC Media Player Mozilla VLC Multimedia Plug-in Vulnerability 8. [SA41340] Adobe Reader / Acrobat SING "uniqueName" Buffer Overflow Vulnerability 9. [SA41791] Sun Java JDK / JRE / SDK Multiple Vulnerabilities 10. [SA43016] WordPress StatPressCN Plugin Cross-Site Scripting Vulnerabilities ======================================================================== 4) This Week in Numbers During the past week 82 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 13 Secunia Advisories Unix/Linux : 28 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 39 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 21 Secunia Advisories Moderately Critical : 17 Secunia Advisories Less Critical : 38 Secunia Advisories Not Critical : 6 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/Received on Fri Jan 28 2011 - 05:17:00 PST
This archive was generated by hypermail 2.2.0 : Fri Jan 28 2011 - 05:24:31 PST