Report: Ten Most Vulnerable Applications for 2010

Saturday, November 20, 2010

Headlines

69dafe8b58066478aea48f3d0f384820

Application whitelisting firm Bit9 has released a report detailing the top ten most vulnerable applications available this year.

The criteria for making the list require that the application be a consumer or end-user product that is not classified as being malicious by reporting outlets and which contains at least one critical vulnerability.

The list of applications is organized in alphabetical order, and the report includes more details on the the following:

  • Adobe Reader and Acrobat: Denial of service threat
  • Adobe Flash: Execution of arbitrary code vulnerability
  • Adobe Shockwave: Denial of service threat
  • Apple QuickTime: Execution of arbitrary code vulnerability
  • Apple Safari: Denial of service and execution of arbitrary code
  • AppleWebKit: Denial of service and execution of arbitrary code
  • Google Chrome: Denial of service threat
  • Microsoft Internet Explorer: Execution of arbitrary code vulnerability
  • Microsoft Office: Execution of arbitrary code vulnerability
  • Mozilla Firefox: Denial of service and execution of arbitrary code
  • Opera: Spoofing, redirects, and execution of arbitrary code
  • Real Networks Real Player: Execution of arbitrary code vulnerability
  • Sun Java Development Kit: Confidentiality, integrity, availability threats

The free report, titled Top Vulnerable Applications–2010, contains more details, including a list of CVE identifiers.

Source: http://www.bit9.com/files/Research_Vulnerable_Apps_2010_FINAL.pdf

Possibly Related Articles:
4973
Webappsec->General
Adobe Firefox Google Java Microsoft Application Security Vulnerabilities
Post Rating I Like this!
Default-avatar
Invar Unvar Watch a free short video about Top 10 vulnerable applications on your network:
http://rocketviews.com/watch?416aO901fuUagic
1330726206
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.