Fw: Secunia Weekly Summary - Issue: 2010-20
--------------------------------------------------
From: "Secunia" <summary@secunia.com>
Sent: Thursday, May 20, 2010 12:07 PM
To: <gerald-----
Subject: Secunia Weekly Summary - Issue: 2010-20
========================================================================
The Secunia Weekly Advisory Summary
2010-05-13 - 2010-05-20
This week: 49 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers
========================================================================
1) Word From Secunia:
Stay Compliant
Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE,
Changelogs, Alternative Remediation Strategies, and much more provided
in the Secunia Vulnerability Intelligence solutions
Free Trial
http://secunia.com/products/corporate/evm/trial/========================================================================
2) This Week in Brief:
Apple has issued an update for Java for Mac OS X. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, manipulate certain data, disclose
potentially sensitive information, cause a DoS (Denial of Service), or
to compromise a user's system.
http://secunia.com/advisories/39819/ --
A vulnerability has been discovered in Microsoft Windows, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a user's system.
http://secunia.com/advisories/39577/========================================================================
3) This Weeks Top Ten Most Read Advisories:
For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/1. [SA39766] Outlook Express / Windows Mail STAT Response Integer
Overflow
2. [SA39670] Apple Safari Information Disclosure and Code Execution
3. [SA38751] Adobe Shockwave Player Multiple Vulnerabilities
4. [SA38416] Microsoft Internet Explorer Local File Disclosure
Vulnerabilities
5. [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6. [SA38547] Adobe Flash Player Domain Sandbox Bypass Vulnerability
7. [SA39828] NPDS REvolution Multiple Vulnerabilities
8. [SA39577] Microsoft Windows Canonical Display Driver Memory
Corruption
9. [SA39731] Debian update for phpgroupware
10. [SA39665] phpGroupWare SQL Injection and Local File Inclusion
Vulnerabilities
========================================================================
4) This Week in Numbers
During the past week 49 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.
This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:
Platforms:
Windows : 7 Secunia Advisories
Unix/Linux : 7 Secunia Advisories
Other : 0 Secunia Advisories
Cross platform : 35 Secunia Advisories
Criticality Ratings:
Extremely Critical : 0 Secunia Advisories
Highly Critical : 6 Secunia Advisories
Moderately Critical : 24 Secunia Advisories
Less Critical : 18 Secunia Advisories
Not Critical : 1 Secunia Advisory
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/Subscribe:
http://secunia.com/advisories/weekly_summary/Contact details:
Web :
http://secunia.com/E-mail : support@secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
========================================================================
To unsubscribe click following link:
http://secunia.com/------[PERHAPS REGULAR PUB ?]