Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2965
Total: 2968









Author Topic: Fw: Secunia Weekly Summary - Issue: 2010-20  (Read 4347 times)

0 Members and 2 Guests are viewing this topic.

Gerald309

  • Guest
Fw: Secunia Weekly Summary - Issue: 2010-20
« on: 21. May 2010., 01:45:34 »
Fw: Secunia Weekly Summary - Issue: 2010-20

--------------------------------------------------
From: "Secunia" <summary@secunia.com>
Sent: Thursday, May 20, 2010 12:07 PM
To: <gerald-----
Subject: Secunia Weekly Summary - Issue: 2010-20

========================================================================

                  The Secunia Weekly Advisory Summary                 
                        2010-05-13 - 2010-05-20                       

                       This week: 49 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:



Stay Compliant

Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE,
Changelogs, Alternative Remediation Strategies, and much more provided
in the Secunia Vulnerability Intelligence solutions

Free Trial
http://secunia.com/products/corporate/evm/trial/



========================================================================
2) This Week in Brief:

Apple has issued an update for Java for Mac OS X. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, manipulate certain data, disclose
potentially sensitive information, cause a DoS (Denial of Service), or
to compromise a user's system.

http://secunia.com/advisories/39819/

 --

A vulnerability has been discovered in Microsoft Windows, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a user's system.

http://secunia.com/advisories/39577/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA39766] Outlook Express / Windows Mail STAT Response Integer
              Overflow
2.  [SA39670] Apple Safari Information Disclosure and Code Execution
3.  [SA38751] Adobe Shockwave Player Multiple Vulnerabilities
4.  [SA38416] Microsoft Internet Explorer Local File Disclosure
              Vulnerabilities
5.  [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6.  [SA38547] Adobe Flash Player Domain Sandbox Bypass Vulnerability
7.  [SA39828] NPDS REvolution Multiple Vulnerabilities
8.  [SA39577] Microsoft Windows Canonical Display Driver Memory
              Corruption
9.  [SA39731] Debian update for phpgroupware
10. [SA39665] phpGroupWare SQL Injection and Local File Inclusion
              Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 49 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      7 Secunia Advisories
  Unix/Linux          :      7 Secunia Advisories
  Other               :      0 Secunia Advisories
  Cross platform      :     35 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      6 Secunia Advisories
  Moderately Critical :     24 Secunia Advisories
  Less Critical       :     18 Secunia Advisories
  Not Critical        :      1 Secunia Advisory 

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web : http://secunia.com/
E-mail : support@secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45

========================================================================

To unsubscribe click following link:
http://secunia.com/------


[PERHAPS REGULAR PUB ?]

Samker's Computer Forum - SCforum.info

Fw: Secunia Weekly Summary - Issue: 2010-20
« on: 21. May 2010., 01:45:34 »

Gerald309

  • Guest
Re: Fw: Secunia Weekly Summary - Issue: 2010-20
« Reply #1 on: 21. May 2010., 01:47:39 »
Suggested as well as a possible ongoing publication - once weekly (light traffic). Helps users to expand a little to known trusted publications.

Samker's Computer Forum - SCforum.info

Re: Fw: Secunia Weekly Summary - Issue: 2010-20
« Reply #1 on: 21. May 2010., 01:47:39 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023