[ISN] Secunia Weekly Summary - Issue: 2012-05

From: InfoSec News <alerts_at_private>
Date: Fri, 3 Feb 2012 03:15:41 -0600 (CST)
========================================================================

                   The Secunia Weekly Advisory Summary
                         2012-01-26 - 2012-02-02

                        This week: 142 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Corporate News
5..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

SC Magazine awards Secunia CSI with a 5-Star rating
The Secunia CSI has been given the top rating in SC Magazine's annual
product review of vulnerability assessment tools for ease of use,
performance, documentation, support, and value for money.
"Secunia Corporate Software Inspector provides full application
vulnerability scanning that is always updated and ready to go to ensure
solid security among all applications throughout the enterprise
environment."
Read more here: http://secunia.com/blog/296

========================================================================
2) This Week in Brief:

Multiple vulnerabilities have been reported in Pale Moon, which can be
exploited by malicious people to bypass certain security restrictions,
disclose certain sensitive information, and compromise a user's system.

http://secunia.com/advisories/47751/

Zero Science Lab has discovered a vulnerability in MindManager, which
can be exploited by malicious people to compromise a user's system.

http://secunia.com/advisories/47797/

A weakness and multiple vulnerabilities have been reported in Mozilla
Firefox and Thunderbird, which can be exploited by malicious people to
disclose certain sensitive information and compromise a user's system.

http://secunia.com/advisories/47839/

Parvez Anwar has discovered a vulnerability in LuraWave JP2 ActiveX
Control, which can be exploited by malicious people to compromise a
user's system.

http://secunia.com/advisories/47350/

A vulnerability has been reported in WHMCompleteSolution, which can be
exploited by malicious people to compromise a vulnerable system.

http://secunia.com/advisories/47782/

Some vulnerabilities have been reported in FFmpeg, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise an application using the library.

http://secunia.com/advisories/47765/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA47779] Apache HTTP Server "httpOnly" Cookie Disclosure and
               Denial of Service
2.  [SA47694] Google Chrome Multiple Vulnerabilities
3.  [SA47758] VMware ESX Server Multiple Vulnerabilities
4.  [SA47720] Cisco IronPort Appliances telnetd Buffer Overflow
               Vulnerability
5.  [SA47161] Adobe Flash Player Unspecified Code Execution
               Vulnerability
6.  [SA47816] Mozilla Firefox / Thunderbird Multiple Vulnerabilities
7.  [SA47736] Oracle Solaris Apache Tomcat Multiple Vulnerabilities
8.  [SA47839] Mozilla Firefox / Thunderbird Multiple Vulnerabilities
9.  [SA47765] FFmpeg Multiple Vulnerabilities
10. [SA47400] Mozilla Firefox Drag and Drop Handling Same Origin
               Policy Bypass Vulnerability

========================================================================
4) Secunia Corporate News

Reports on vulnerabilities, vulnerability management, and risk
management
Secunia regularly cooperates with independent analyst houses as well as
delivering in-house research reports and white papers on vulnerability
trends. Access our library here:
http://secunia.com/resources/reports/

Secunia @ RSA Conference 2012, San Francisco, USA, 27 Feb-02 March
Meet the Secunia team on stand #817 to discuss how you can enhance your
vulnerability/patch management process. Find out more:
http://www.rsaconference.com/events/2012/usa/index.htm

========================================================================
5) This Week in Numbers

During the past week 142 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
   Windows             :     15 Secunia Advisories
   Unix/Linux          :     60 Secunia Advisories
   Other               :      9 Secunia Advisories
   Cross platform      :     58 Secunia Advisories

Criticality Ratings:
   Extremely Critical  :      0 Secunia Advisories
   Highly Critical     :     33 Secunia Advisories
   Moderately Critical :     37 Secunia Advisories
   Less Critical       :     60 Secunia Advisories
   Not Critical        :     12 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support_at_private
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45


_____________________________________________________
Did a friend send you this article? Make it your
New Year's Resolution to subscribe to InfoSec News!
http://www.infosecnews.org/mailman/listinfo/isn
Received on Fri Feb 03 2012 - 01:15:41 PST

This archive was generated by hypermail 2.2.0 : Fri Feb 03 2012 - 01:22:36 PST