======================================================================== The Secunia Weekly Advisory Summary 2011-11-24 - 2011-12-01 This week: 37 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4................................................Secunia Corporate News 5..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Secunia is hiring: http://secunia.com/company/jobs/ ======================================================================== 2) This Week in Brief: Nick Freeman has reported a vulnerability in StoryBoard Quick, which can be exploited by malicious people to compromise a user's system. http://secunia.com/advisories/47045 Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, and compromise a user's system. http://secunia.com/advisories/47046/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions: http://secunia.com/advisories/business_solutions/ 1. [SA46512] Oracle Java SE Multiple Vulnerabilities 2. [SA46987] Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness 3. [SA46984] Oracle Solaris ISC BIND Recursive Query Processing Denial of Service Vulnerability 4. [SA46974] SRWare Iron Multiple Vulnerabilities 5. [SA46818] Adobe Flash Player Multiple Vulnerabilities 6. [SA46956] Horde Multiple Products Private Tasks Security Bypass Security Issue 7. [SA46980] Koha "KohaOpacLanguage" Local File Inclusion Vulnerability 8. [SA46983] iTop Multiple Cross-Site Scripting and Code Injection Vulnerabilities 9. [SA46911] Jenkins winstone Servlet Container Script Insertion Vulnerability 10. [SA47046] Schneider Electric Products Multiple Vulnerabilities ======================================================================== 4) Secunia Corporate News Blast: 10 free apps you have to install on your computer The Secunia PSI is recommended in Blast's guide of programs that are free to download and install. Read more: https://secunia.com/company/blog_news/articles/286/ ======================================================================== 5) This Week in Numbers During the past week 37 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 6 Secunia Advisories Unix/Linux : 15 Secunia Advisories Other : 1 Secunia Advisory Cross platform : 15 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 5 Secunia Advisories Moderately Critical : 8 Secunia Advisories Less Critical : 21 Secunia Advisories Not Critical : 3 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Subscribe to InfoSec News - www.infosecnews.org http://www.infosecnews.org/mailman/listinfo/isnReceived on Fri Dec 02 2011 - 00:24:14 PST
This archive was generated by hypermail 2.2.0 : Fri Dec 02 2011 - 00:23:10 PST