[ISN] Secunia Weekly Summary - Issue: 2012-07

From: InfoSec News <alerts_at_private>
Date: Fri, 17 Feb 2012 04:33:05 -0600 (CST)
========================================================================

                   The Secunia Weekly Advisory Summary
                         2012-02-09 - 2012-02-16

                        This week: 70 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Corporate News
5..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia presentations at @ RSA Conference 2012, San Francisco, USA, 27
Feb-02 March
  * Carsten Eiram, Chief Security Specialist (Vulnerability Panel: Is it
Zero Day or Zero Care? 28 Feb, 15:50, Room 102)
  * Morten R. Stengaard, Director Product Management & Quality Assurance
(Is your mother/partner/child/friend vulnerable? 29 Feb, 14:30, Briefing
Center)
  * Stefan Frei, Research Analyst Director (Sponsor case study track:
How can a CIO secure a moving target with limited resources? 01 Mar,
09:30, Room 121)

Also, meet the Secunia team on stand #817 to discuss how you can
enhance your vulnerability/patch management process.

Find out more:
http://www.rsaconference.com/events/2012/usa/index.htm


========================================================================
2) This Week in Brief:

Multiple vulnerabilities have been reported in Oracle Java SE, which
can be exploited by malicious people to disclose potentially sensitive
information, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.
http://secunia.com/advisories/48009/

Multiple vulnerabilities have been reported in Microsoft Internet
Explorer, which can be exploited by malicious people to bypass certain
security restrictions, disclose potentially sensitive information, and
compromise a user's system.
http://secunia.com/advisories/48028/

Multiple vulnerabilities have been reported in Adobe Shockwave Player,
which can be exploited by malicious people to compromise a user's
system.
http://secunia.com/advisories/47932/

A vulnerability has been reported in multiple Mozilla products, which
can be exploited by malicious people to compromise a user's system.
http://secunia.com/advisories/48008/

A vulnerability has been reported in ALFTP, which can be exploited by
malicious people to compromise a user's system.
http://secunia.com/advisories/48027/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA48024] Horde Groupware Webmail Edition Multiple Vulnerabilities
2.  [SA47972] Horde Groupware Two Vulnerabilities
3.  [SA47938] Google Chrome Multiple Vulnerabilities
4.  [SA48008] Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding
               Use-After-Free Vulnerability
5.  [SA48009] Oracle Java SE Multiple Vulnerabilities
6.  [SA47161] Adobe Flash Player Unspecified Code Execution
               Vulnerability
7.  [SA47894] MySQL Unspecified Code Execution Vulnerability
8.  [SA47947] Gazie Cross-Site Request Forgery Vulnerability
9.  [SA47932] Adobe Shockwave Player Multiple Vulnerabilities
10. [SA47806] PHP "php_register_variable_ex()" Code Execution
               Vulnerability

========================================================================
4) Secunia Corporate News

Secunia Yearly Report 2011

Discover the main challenges that organisation.s face when protecting
their software portfolios. Secunia analyses the evolution of software
security from a global, industry, enterprise, and end-point
perspective. We present data on vulnerability, exploit, and patch
availability and correlate this information with the market share of
programs to evaluate the true threats.

Find out more and download the report here:
http://secunia.com/blog/299/

========================================================================
5) This Week in Numbers

During the past week 70 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
   Windows             :     10 Secunia Advisories
   Unix/Linux          :     41 Secunia Advisories
   Other               :      1 Secunia Advisory
   Cross platform      :     18 Secunia Advisories

Criticality Ratings:
   Extremely Critical  :      2 Secunia Advisories
   Highly Critical     :     18 Secunia Advisories
   Moderately Critical :     16 Secunia Advisories
   Less Critical       :     29 Secunia Advisories
   Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support_at_private
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45


______________________________________________________________________________
Certified Ethical Hacker and CISSP training with Expanding Security gives
the best training and support.
Get a free live class invite weekly.  Best program, best price.
www.ExpandingSecurity.com/PainPill
Received on Fri Feb 17 2012 - 02:33:05 PST

This archive was generated by hypermail 2.2.0 : Fri Feb 17 2012 - 02:37:04 PST