Information Security News mailing list archives

Secunia Weekly Summary - Issue: 2011-48


From: InfoSec News <alerts () infosecnews org>
Date: Fri, 2 Dec 2011 02:24:14 -0600 (CST)

========================================================================

                  The Secunia Weekly Advisory Summary
                        2011-11-24 - 2011-12-01

                       This week: 37 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Corporate News
5..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia is hiring:

http://secunia.com/company/jobs/

========================================================================
2) This Week in Brief:

Nick Freeman has reported a vulnerability in StoryBoard Quick, which
can be exploited by malicious people to compromise a user's system.
http://secunia.com/advisories/47045

Multiple vulnerabilities have been reported in multiple Schneider
Electric products, which can be exploited by malicious people to
conduct cross-site scripting attacks, disclose potentially sensitive
information, and compromise a user's system.
http://secunia.com/advisories/47046/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA46512] Oracle Java SE Multiple Vulnerabilities
2.  [SA46987] Apache HTTP Server mod_proxy Reverse Proxy Mode Security
              Bypass Weakness
3.  [SA46984] Oracle Solaris ISC BIND Recursive Query Processing
              Denial of Service Vulnerability
4.  [SA46974] SRWare Iron Multiple Vulnerabilities
5.  [SA46818] Adobe Flash Player Multiple Vulnerabilities
6.  [SA46956] Horde Multiple Products Private Tasks Security Bypass
              Security Issue
7.  [SA46980] Koha "KohaOpacLanguage" Local File Inclusion
              Vulnerability
8.  [SA46983] iTop Multiple Cross-Site Scripting and Code Injection
              Vulnerabilities
9.  [SA46911] Jenkins winstone Servlet Container Script Insertion
              Vulnerability
10. [SA47046] Schneider Electric Products Multiple Vulnerabilities

========================================================================
4) Secunia Corporate News

Blast: 10 free apps you have to install on your computer
The Secunia PSI is recommended in Blast's guide of programs that are
free to download and install. Read more:
https://secunia.com/company/blog_news/articles/286/

========================================================================
5) This Week in Numbers

During the past week 37 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      6 Secunia Advisories
  Unix/Linux          :     15 Secunia Advisories
  Other               :      1 Secunia Advisory
  Cross platform      :     15 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      5 Secunia Advisories
  Moderately Critical :      8 Secunia Advisories
  Less Critical       :     21 Secunia Advisories
  Not Critical        :      3 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support () secunia com
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45


_____________________________________________________
Subscribe to InfoSec News - www.infosecnews.org
http://www.infosecnews.org/mailman/listinfo/isn


Current thread: