AOH :: ISNQ5557.HTM

Secunia Weekly Summary - Issue: 2009-43




Secunia Weekly Summary - Issue: 2009-43
Secunia Weekly Summary - Issue: 2009-43



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2009-10-15 - 2009-10-22                        

                       This week: 48 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

=======================================================================1) Word From Secunia:

The Secunia Vulnerability alerting and remediation solutions are GSA
approved for purchase by federal and government administration agencies
within the United States under the (GSA) General Services
Administration.

Find details under:
GSA Pricing - GSA Contract # GS-35F-0858N

About GSA:
GSA's acquisition solutions offer private sector professional services,
equipment, supplies, telecommunications, and information technology to
government organizations and the military. GSA policies promote
management best practices and efficient government operations.

http://www.gsa.gov/ 

=======================================================================2) This Week in Brief:

Some vulnerabilities have been reported in Oracle Database, which can
exploited to disclose sensitive information, cause a DoS (Denial of
Service), manipulate certain data, or compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/37027/ 

 --

VMware has acknowledged some vulnerabilities in multiple VMware
products, which can be exploited by malicious, local users to perform
certain actions with escalated privileges, and by malicious people to
bypass certain security restrictions, disclose sensitive information,
cause a DoS (Denial of service), or compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/37055/ 

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA36983] Adobe Reader/Acrobat Multiple Vulnerabilities
2.  [SA35948] Adobe Flash Player Multiple Vulnerabilities
3.  [SA37007] Microsoft Products GDI+ Multiple Vulnerabilities
4.  [SA36649] Mozilla Firefox Temporary File Download Manipulation
              Security Issue
5.  [SA24314] Internet Explorer Charset Inheritance Cross-Site
              Scripting Vulnerability
6.  [SA36979] Microsoft Internet Explorer Multiple Vulnerabilities
7.  [SA37049] Foxit Reader Firefox Plugin Memory Corruption
              Vulnerability
8.  [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
9.  [SA37055] VMware Products DHCP and JRE Multiple Vulnerabilities
10. [SA37006] Microsoft .NET Framework Multiple Vulnerabilities

=======================================================================4) This Week in Numbers

During the past week 48 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      8 Secunia Advisories
  Unix/Linux          :     22 Secunia Advisories
  Other               :      2 Secunia Advisories
  Cross platform      :     16 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     14 Secunia Advisories
  Moderately Critical :     14 Secunia Advisories
  Less Critical       :     17 Secunia Advisories
  Not Critical        :      3 Secunia Advisories

=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/ 

Subscribe:
http://secunia.com/advisories/weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods