AOH :: ISNQ6864.HTM

Secunia Weekly Summary - Issue: 2010-33




Secunia Weekly Summary - Issue: 2010-33
Secunia Weekly Summary - Issue: 2010-33



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1457021584-275938458-1282287080=:17900
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Content-Transfer-Encoding: QUOTED-PRINTABLE
Content-ID:  

=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2010-08-12 - 2010-08-19                        

                       This week: 44 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

=======================================================================1) Word From Secunia:


Secunia wins the 2010 Global Frost & Sullivan Award for Customer Value
Enhancement.

"Secunia=E2=80=99s penetration rate in the vulnerability research market is
directly attributable to its firm commitment towards enhancing the
value that customers derive from the company=E2=80=99s product and services,"
says Frost & Sullivan Industry Analyst Chris Rodriguez.

Download the complete research report by Frost & Sullivan at:
http://secunia.com/gfx/pdf/Frost_Sullivan_Secunia_2010.pdf 


=======================================================================2) This Week in Brief:

Tavis Ormandy has discovered a vulnerability in Microsoft Windows,
which can be exploited by malicious, local users to cause a Denial of
Service (DoS).

http://secunia.com/advisories/41029/ 

--

Several vulnerabilities have been reported in Palm Pre WebOS, where
some have an unknown impact and others can be exploited to compromise a
vulnerable device.

http://secunia.com/advisories/40975 

=======================================================================3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/ 

1.  [SA40907] Adobe Flash Player Multiple Vulnerabilities
2.  [SA40766] Adobe Reader/Acrobat Multiple Vulnerabilities
3.  [SA40729] QuickTime Player Streaming Debug Error Logging Buffer
     Overflow
4.  [SA40917] Google Chrome Update for Flash Plugin
5.  [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6.  [SA40870] Microsoft Windows win32k.sys Driver "CreateDIBPalette()"
     Buffer Overflow
7.  [SA24314] Internet Explorer Charset Inheritance Cross-Site
     Scripting Vulnerability
8.  [SA40034] Adobe Reader/Acrobat Multiple Vulnerabilities
9.  [SA40936] Microsoft Windows Cinepak Codec Decompression
     Vulnerability
10. [SA40872] Microsoft .NET Framework / Silverlight Code Execution
     Vulnerabilities

=======================================================================4) This Week in Numbers

During the past week 44 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      7 Secunia Advisories
  Unix/Linux          :     13 Secunia Advisories
  Other               :      2 Secunia Advisories
  Cross platform      :     22 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      5 Secunia Advisories
  Moderately Critical :     15 Secunia Advisories
  Less Critical       :     20 Secunia Advisories
  Not Critical        :      4 Secunia Advisories

=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/ 

Subscribe:
http://secunia.com/advisories/weekly_summary/ 

Contact details:
Web=09: http://secunia.com/ 
E-mail=09: support@secunia.com 
Tel=09: +45 70 20 51 44
Fax=09: +45 70 20 51 45


--1457021584-275938458-1282287080=:17900
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________________      
Subscribe to InfoSec News - www.infosecnews.org 
http://www.infosecnews.org/mailman/listinfo/isn 

--1457021584-275938458-1282287080=:17900--

Site design & layout copyright © 1986-2014 CodeGods