[ISN] Secunia Weekly Summary - Issue: 2011-25

From: InfoSec News <alerts_at_private>
Date: Mon, 27 Jun 2011 00:39:34 -0700 (MST)
========================================================================

                   The Secunia Weekly Advisory Summary
                         2011-06-17 - 2011-06-24

                        This week: 47 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Community News
5................................................Secunia Corporate News
6..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

CSO Online: Secunia comments on SQL injection attacks
According to CSO, SQL injection attacks represent major security
concerns for web developers and site owners and can cause massive
website compromises. ???The attack underscores that site owners need to
do better security analyses of their sites. Most companies, however,
will not tackle remediating expensive vulnerabilities in their Web
sites unless it is a priority from executives.??? Thomas Kristensen,
CSO, Secunia.

Read more:
http://secunia.com/company/blog_news/articles/229

========================================================================
2) This Week in Brief:

Multiple vulnerabilities have been reported in Mozilla Firefox and
Thunderbird, which can be exploited by malicious people to bypass
certain security restrictions and compromise a user's system.

http://secunia.com/advisories/44982/

  --

A vulnerability has been reported in Piwik, which can be exploited by
malicious people to compromise a vulnerable system.

http://secunia.com/advisories/45003/

  --

Some vulnerabilities have been reported in BlackBerry Tablet OS, which
can be exploited by malicious people to disclose potentially sensitive
information and compromise a user's system.

http://secunia.com/advisories/45004/

  --

Protek Research Lab's has discovered a vulnerability in Microsoft Word,
which can be exploited by malicious people to compromise a user's
system.

http://secunia.com/advisories/44923/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA44964] Adobe Flash Player Unspecified Memory Corruption
               Vulnerability
2.  [SA44784] Sun Java JDK / JRE / SDK Multiple Vulnerabilities
3.  [SA44972] Mozilla Firefox Multiple Vulnerabilities
4.  [SA43269] Adobe Reader / Acrobat Multiple Vulnerabilities
5.  [SA44923] Microsoft Word Insufficient Pointer Validation
               Vulnerability
6.  [SA44899] Microsoft .NET Framework JIT Object Validation
               Vulnerability
7.  [SA44914] Microsoft Internet Explorer Multiple Vulnerabilities
8.  [SA44950] Google Chrome Flash Player Unspecified Memory Corruption
               Vulnerability
9.  [SA43811] Adobe Shockwave Player Multiple Vulnerabilities
10. [SA44982] Mozilla Firefox / Thunderbird Multiple Vulnerabilities

========================================================================
4) Secunia Community News

Network World article highlights Secunia Personal Software Inspector
(PSI)
???Why the Windows 8 App Store is Good News for IT??? talks about the
rumoured Microsoft Windows App Store and discusses PC security ??? in
particular scanning with the Secunia PSI ??? because how many people
know how secure their PCs are?

Read more:
http://secunia.com/company/blog_news/articles/228

========================================================================
5) Secunia Corporate News

Be tactical in your handling of vulnerability threats
The Secunia Vulnerability Manager (VIM) enables you to take pre-emptive
action against vulnerabilities in a simple, cost effective way.

Read more and request a free trial:
http://secunia.com/products/corporate/vim/

========================================================================
6) This Week in Numbers

During the past week 47 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
   Windows             :      7 Secunia Advisories
   Unix/Linux          :     20 Secunia Advisories
   Other               :      2 Secunia Advisories
   Cross platform      :     18 Secunia Advisories

Criticality Ratings:
   Extremely Critical  :      0 Secunia Advisories
   Highly Critical     :     16 Secunia Advisories
   Moderately Critical :     13 Secunia Advisories
   Less Critical       :     13 Secunia Advisories
   Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



___________________________________________________________
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery
Network, Cisco Switches, SAS 70 Type II Datacenter.
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/
Received on Mon Jun 27 2011 - 00:39:34 PDT

This archive was generated by hypermail 2.2.0 : Mon Jun 27 2011 - 00:44:44 PDT