A new Flexera Community experience is coming on November 18th, click here for more information.
Secunia Research issued 448 advisories for 80 unique vendors in 253 products and 336 unique versions, and issued 76 rejected advisories. A 28% decrease in the total number of advisories from the previous month.
The number of updates for browsers is increasing—no Zero-day advisories in May.
Secunia advisories combine vulnerabilities for the same products together for easy consumption and decision making. 76 advisories were rejected so that security teams can focus on the correct priorities.
The frequency for Brower advisories and updates is growing each month and usually need multiple update cycles.
Two highly critical advisories were issued for Google Chrome. Similarly, two highly critical advisories for Mozilla Firefox each.
One advisory for Microsoft Internet Explorer 11.x and 9.x, and Mozilla Thunderbird.
Keep your browsers updated due to exposure.
Secunia Advisory criticalities are further explained at this link.
A large proportion of vulnerabilities (68%) can be exploited from remote – usually the case.
CVSS v3 is the industry standard to define the severity of the vulnerabilities, its exploitability, impact metrics, and environmental metrics.
The criteria for Threat Score calculation are outlined at this link.
5 instances of kinsing , Loncom, and Mandrake with CVE-2020-6819 and CVE-2020-6820 related to Mozilla Firefox, ESR, Thunderbird, and Seamonkey. Similarly, Amazon Linux, Fedora, CentOS has shipped updates for these software.
CVE-2020-1048 can be exploited by Stuxnet malware. Vulnerability results in the elevation of Privileges in Windows Print Spooler services in Microsoft Windows Server 2019, 2016, 2012, 2008, and Windows 7, 8.1, and 10.
The number of advisories decreased from the last month. However, the frequency of operating systems and browser patches is increasing.
A complete list of vulnerabilities affected versions, criticality, threat score, and relevant patch information are available in the Software Vulnerability Research and Software Vulnerability Manager solutions from Flexera.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.