infosec-news September 2010 archive
Main Archive Page > Month Archives  > infosec-news archives
infosec-news: [ISN] Secunia Weekly Summary - Issue: 2010-37

[ISN] Secunia Weekly Summary - Issue: 2010-37

From: InfoSec News <alerts_at_nospam>
Date: Fri Sep 17 2010 - 06:37:35 GMT


                  The Secunia Weekly Advisory Summary
                        2010-09-09 - 2010-09-16

                       This week: 79 advisories

Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

1) Word From Secunia:

Auto Update your Programs - Secunia PSI 2.0 Public Beta

We are happy to announce the immediate availability of the Secunia
Personal Software Inspector (PSI) 2.0 Beta.

Read More:


Secunia PSI 2.0 Auto Updates: A flying start and interesting numbers!

The interest for the new Secunia PSI 2.0 Beta, released yesterday, has
been outright astonishing. After 24 hours, more than 6,500 security
conscious users already installed, scanned, and patched using the new

Read More:


Secunia CSI 4.1 released - enhanced reporting, new features, and
integration with Secunia PSI

The Secunia CSI 4.1 is available for immediately download for existing
Secunia CSI 4.0 customers. If you're not yet a customer you can request
a trial account.

Read More:


Secunia wins the 2010 Global Frost & Sullivan Award for Customer Value

"Secunia’s penetration rate in the vulnerability research market is
directly attributable to its firm commitment towards enhancing the
value that customers derive from the company’s product and services,"
says Frost & Sullivan Industry Analyst Chris Rodriguez.

Download the complete research report by Frost & Sullivan at:

2) This Week in Brief:

Windows Applications Insecure Library Loading

The Official, Verified Secunia List:

The list is continuously updated as we confirm the vulnerability
reports so check back regularly too see if any of your apps are


A vulnerability has been reported in Adobe Flash Player, which can be
exploited by malicious people to compromise a user's system.


A vulnerability has been reported in Adobe Reader/Acrobat, which can be
exploited by malicious people to compromise a user's system.

3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:

1. [SA40907] Adobe Flash Player Multiple Vulnerabilities
2. [SA40766] Adobe Reader/Acrobat Multiple Vulnerabilities
3. [SA40729] QuickTime Player Streaming Debug Error Logging Buffer
4. [SA40917] Google Chrome Update for Flash Plugin
5. [SA37255] Sun Java JDK / JRE Multiple Vulnerabilities
6. [SA40870] Microsoft Windows win32k.sys Driver "CreateDIBPalette()"
              Buffer Overflow
7. [SA24314] Internet Explorer Charset Inheritance Cross-Site
              Scripting Vulnerability
8. [SA40034] Adobe Reader/Acrobat Multiple Vulnerabilities
9. [SA40936] Microsoft Windows Cinepak Codec Decompression
10. [SA40872] Microsoft .NET Framework / Silverlight Code Execution

4) This Week in Numbers

During the past week 79 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

  Windows : 31 Secunia Advisories
  Unix/Linux : 19 Secunia Advisories
  Other : 2 Secunia Advisories
  Cross platform : 27 Secunia Advisories

Criticality Ratings:
  Extremely Critical : 3 Secunia Advisories
  Highly Critical : 21 Secunia Advisories
  Moderately Critical : 27 Secunia Advisories
  Less Critical : 26 Secunia Advisories
  Not Critical : 2 Secunia Advisories


Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)


Contact details:
Web :
E-mail :
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45

Subscribe to InfoSec News -