[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ISN] Secunia Weekly Summary - Issue: 2012-07



========================================================================

                  The Secunia Weekly Advisory Summary
                        2012-02-09 - 2012-02-16

                       This week: 70 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Corporate News
5..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia presentations at @ RSA Conference 2012, San Francisco, USA, 27
Feb-02 March
 * Carsten Eiram, Chief Security Specialist (Vulnerability Panel: Is it
Zero Day or Zero Care? 28 Feb, 15:50, Room 102)
 * Morten R. Stengaard, Director Product Management & Quality Assurance
(Is your mother/partner/child/friend vulnerable? 29 Feb, 14:30, Briefing
Center)
 * Stefan Frei, Research Analyst Director (Sponsor case study track:
How can a CIO secure a moving target with limited resources? 01 Mar,
09:30, Room 121)

Also, meet the Secunia team on stand #817 to discuss how you can
enhance your vulnerability/patch management process.

Find out more:
http://www.rsaconference.com/events/2012/usa/index.htm


========================================================================
2) This Week in Brief:

Multiple vulnerabilities have been reported in Oracle Java SE, which
can be exploited by malicious people to disclose potentially sensitive
information, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.
http://secunia.com/advisories/48009/

Multiple vulnerabilities have been reported in Microsoft Internet
Explorer, which can be exploited by malicious people to bypass certain
security restrictions, disclose potentially sensitive information, and
compromise a user's system.
http://secunia.com/advisories/48028/

Multiple vulnerabilities have been reported in Adobe Shockwave Player,
which can be exploited by malicious people to compromise a user's
system.
http://secunia.com/advisories/47932/

A vulnerability has been reported in multiple Mozilla products, which
can be exploited by malicious people to compromise a user's system.
http://secunia.com/advisories/48008/

A vulnerability has been reported in ALFTP, which can be exploited by
malicious people to compromise a user's system.
http://secunia.com/advisories/48027/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA48024] Horde Groupware Webmail Edition Multiple Vulnerabilities
2.  [SA47972] Horde Groupware Two Vulnerabilities
3.  [SA47938] Google Chrome Multiple Vulnerabilities
4.  [SA48008] Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding
              Use-After-Free Vulnerability
5.  [SA48009] Oracle Java SE Multiple Vulnerabilities
6.  [SA47161] Adobe Flash Player Unspecified Code Execution
              Vulnerability
7.  [SA47894] MySQL Unspecified Code Execution Vulnerability
8.  [SA47947] Gazie Cross-Site Request Forgery Vulnerability
9.  [SA47932] Adobe Shockwave Player Multiple Vulnerabilities
10. [SA47806] PHP "php_register_variable_ex()" Code Execution
              Vulnerability

========================================================================
4) Secunia Corporate News

Secunia Yearly Report 2011

Discover the main challenges that organisation.s face when protecting
their software portfolios. Secunia analyses the evolution of software
security from a global, industry, enterprise, and end-point
perspective. We present data on vulnerability, exploit, and patch
availability and correlate this information with the market share of
programs to evaluate the true threats.

Find out more and download the report here:
http://secunia.com/blog/299/

========================================================================
5) This Week in Numbers

During the past week 70 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     10 Secunia Advisories
  Unix/Linux          :     41 Secunia Advisories
  Other               :      1 Secunia Advisory
  Cross platform      :     18 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      2 Secunia Advisories
  Highly Critical     :     18 Secunia Advisories
  Moderately Critical :     16 Secunia Advisories
  Less Critical       :     29 Secunia Advisories
  Not Critical        :      5 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support@xxxxxxxxxxx
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45


______________________________________________________________________________
Certified Ethical Hacker and CISSP training with Expanding Security gives
the best training and support.
Get a free live class invite weekly.  Best program, best price.
www.ExpandingSecurity.com/PainPill