AOH :: ISNQ7006.HTM

Secunia Weekly Summary - Issue: 2010-39




Secunia Weekly Summary - Issue: 2010-39
Secunia Weekly Summary - Issue: 2010-39



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1457021584-957359155-1285915178=:18672
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Content-Transfer-Encoding: QUOTED-PRINTABLE
Content-ID:  

=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2010-09-23 - 2010-09-30                        

                       This week: 63 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

=======================================================================1) Word From Secunia:

In one week, Secunia receives five awards from a number of recognised
industry players: Frost & Sullivan, Computerworld Denmark, B=C3=B8rsen, and
OTA.

Read more at: http://secunia.com/blog/139/ 

=======================================================================2) This Week in Brief:

Windows Applications Insecure Library Loading

The Official, Verified Secunia List:
http://secunia.com/advisories/windows_insecure_library_loading/ 

The list is continuously updated as we confirm the vulnerability
reports so check back regularly too see if any of your apps are
affected.

 --

Multiple vulnerabilities have been reported in MPlayer, which can be
exploited by malicious people to compromise a user's system.

http://secunia.com/advisories/41645/ 

=======================================================================3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/ 

1.  [SA41434] Adobe Flash Player Unspecified Code Execution
              Vulnerability
2.  [SA41340] Adobe Reader / Acrobat SING "uniqueName" Buffer
              Overflow Vulnerability
3.  [SA41435] Adobe Reader/Acrobat Flash Player Unspecified Code
              Execution Vulnerability
4.  [SA41244] Mozilla Firefox NSS Certificate IP Address Wildcard
              Matching Vulnerability
5.  [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6.  [SA41297] Mozilla Firefox Multiple Vulnerabilities
7.  [SA41409] Microsoft ASP.NET Cryptographic Padding Oracle
              Information Disclosure
8.  [SA41525] Microsoft Windows Unspecified Privilege Escalation
              Vulnerability
9.  [SA41213] Apple QuickTime QTPlugin.ocx Input Validation
              Vulnerability
10. [SA41574] VMware Update for Workstation and Player

=======================================================================4) This Week in Numbers

During the past week 63 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      6 Secunia Advisories
  Unix/Linux          :     28 Secunia Advisories
  Other               :      1 Secunia Advisory  
  Cross platform      :     28 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      7 Secunia Advisories
  Moderately Critical :     20 Secunia Advisories
  Less Critical       :     35 Secunia Advisories
  Not Critical        :      1 Secunia Advisory  

=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/ 

Subscribe:
http://secunia.com/advisories/weekly_summary/ 

Contact details:
Web=09: http://secunia.com/ 
E-mail=09: support@secunia.com 
Tel=09: +45 70 20 51 44
Fax=09: +45 70 20 51 45


--1457021584-957359155-1285915178=:18672
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________________      
Subscribe to InfoSec News - www.infosecnews.org 
http://www.infosecnews.org/mailman/listinfo/isn 

--1457021584-957359155-1285915178=:18672--

Site design & layout copyright © 1986-2014 CodeGods