Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #299
------------------------------

This Issue is Sponsored By: SPI Dynamics

ALERT: How a Hacker Launches a SQL Injection Attack
It's as simple as placing additional SQL commands into a Web Form input box
giving hackers complete access to all your backend systems! Firewalls and
IDS will not stop such attacks because SQL Injections are NOT seen as
intruders. Download this *FREE* white paper from SPI Dynamics for a
complete guide to protection! 

http://www.securityfocus.com/sponsor/SPIDynamics_sf-news_050503

------------------------------------------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Sarbanes Oxley for IT Security?
     2. Cleanliness next to Rootliness
II. BUGTRAQ SUMMARY
     1. Black Knight Forum Member.ASP SQL Injection Vulnerability
     2. Black Knight Forum Forum.ASP SQL Injection Vulnerability
     3. Black Knight Forum Register.ASP SQL Injection Vulnerability
     4. CartWIZ AddToCart.ASP SQL Injection Vulnerability
     5. CartWIZ ProductCatalogSubCats.ASP SQL Injection Vulnerabilit...
     6. CartWIZ ProductDetails.ASP SQL Injection Vulnerability
     7. CartWIZ SearchResults.ASP PriceTo Argument SQL Injection Vul...
     8. CartWIZ SearchResults.ASP PriceFrom Argument SQL Injection V...
     9. CartWIZ SearchResults.ASP IDCategory Argument SQL Injection ...
     10. CartWIZ TellAFriend.ASP Cross-Site Scripting Vulnerability
     11. CartWIZ AddToWishlist.ASP Cross-Site Scripting Vulnerability
     12. CartWIZ Access.ASP Cross-Site Scripting Vulnerability
     13. CartWIZ Error.ASP Cross-Site Scripting Vulnerability
     14. CartWIZ Login.ASP Redirect Argument Cross-Site Scripting Vul...
     15. CartWIZ Login.ASP Message Argument Cross-Site Scripting Vuln...
     16. CartWIZ SearchResults.ASP SKU Argument Cross-Site Scripting ...
     17. CartWIZ SearchResults.ASP Name Argument Cross-Site Scripting...
     18. PHPBB Profile.PHP Cross-Site Scripting Vulnerability
     19. PHPBB Viewtopic.PHP Cross-Site Scripting Vulnerability
     20. ACS Blog Administrative Access Authentication Bypass Vulnera...
     21. Affix Bluetooth Protocol Stack Signed Buffer Index Vulnerabi...
     22. SNMPPD SNMP Proxy Daemon Remote Format String Vulnerability
     23. IBM WebSphere Application Server Error Page Cross-Site Scrip...
     24. MailEnable HTTP Authorization Buffer Overflow Vulnerability
     25. ImageMagick PNM Image Decoding Remote Buffer Overflow Vulner...
     26. PHPMyVisites Part Variable Cross-Site Scripting Vulnerabilit...
     27. WoltLab Burning Board PMS.PHP Cross-Site Scripting Vulnerabi...
     28. nProtect Netizen ActiveX Control Arbitrary File Creation Vul...
     29. SWSoft Confixx Change User SQL Injection Vulnerability
     30. PHPMyVisites Per Variable Cross-Site Scripting Vulnerability
     31. PHPMyVisites Site Variable Cross-Site Scripting Vulnerabilit...
     32. StorePortal Default.ASP Multiple SQL Injection Vulnerabiliti...
     33. Novell Nsure Audit Remote Denial Of Service Vulnerability
     34. Horde Vacation Remote Cross-Site Scripting Vulnerability
     35. OneWorldStore IDOrder Information Disclosure Vulnerability
     36. Horde MNemo Remote Cross-Site Scripting Vulnerability
     37. Horde Nag Remote Cross-Site Scripting Vulnerability
     38. Horde Chora Remote Cross-Site Scripting Vulnerability
     39. Horde Accounts Module Remote Cross-Site Scripting Vulnerabil...
     40. Horde Forward Module Remote Cross-Site Scripting Vulnerabili...
     41. HP-UX ICMP PMTUD Remote Denial Of Service Vulnerability
     42. MySQL MaxDB HTTP GET Request Remote Buffer Overflow Vulnerab...
     43. MySQL MaxDB WebDAV Lock Token Remote Buffer Overflow Vulnera...
     44. PHPMyVisites Set_Lang File Include Vulnerability
     45. Yappa-NG Unspecified Remote File Include Vulnerability
     46. Yappa-NG Unspecified Cross-Site Scripting Vulnerability
     47. Citrix Program Neighborhood Agent AppCache Buffer Overflow V...
     48. Invision Power Board QPid Parameter SQL Injection Vulnerabil...
     49. MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection...
     50. MetaCart E-Shop V-8 StrCatalog_NAME Parameter Remote SQL Inj...
     51. MySQL MaxDB WebDAV IF Parameter Remote Buffer Overflow Vulne...
     52. Citrix Program Neighborhood Agent Malicious Shortcut Creatio...
     53. TCPDump BGP Decoding Routines Denial Of Service Vulnerabilit...
     54. GrayCMS Error.PHP Remote File Include Vulnerability
     55. MetaCart2 IntCatalogID Parameter Remote SQL Injection Vulner...
     56. MetaCart2 StrSubCatalogID Parameter Remote SQL Injection Vul...
     57. MetaCart2 CurCatalogID Parameter Remote SQL Injection Vulner...
     58. MetaCart2 strSubCatalog_NAME Parameter Remote SQL Injection ...
     59. Fastream NetFile FTP/Web Server Directory Traversal Variant ...
     60. TCPDump LDP Decoding Routines Denial Of Service Vulnerabilit...
     61. TCPDump RSVP Decoding Routines Denial Of Service Vulnerabili...
     62. Ethereal RSVP Decoding Routines Denial Of Service Vulnerabil...
     63. TCPDump ISIS Decoding Routines Denial Of Service Vulnerabili...
     64. MetaCart2 SearchAction.ASP Multiple SQL Injection Vulnerabil...
     65. VooDoo Circle BotNet Connection Denial of Service Vulnerabil...
     66. MetaBid Auctions intAuctionID Parameter Remote SQL Injection...
     67. Intersoft NetTerm Netftpd USER Buffer Overflow Vulnerability
     68. BBlog Index.PHP HTML Injection Vulnerability
     69. BBlog PostID Parameter SQL Injection Vulnerability
     70. Rootkit Hunter Local Insecure Temporary File Creation Vulner...
     71. BEA WebLogic Server And WebLogic Express Administration Cons...
     72. Convert-UUlib Perl Module Buffer Overflow Vulnerability
     73. Debian CVS-Repouid Remote Authentication Bypass Vulnerabilit...
     74. Debian CVS-Repouid Denial Of Service Vulnerability
     75. ABCZone.IT WWWGuestBook Login.ASP SQL Injection Vulnerabilit...
     76. PHP-Calendar Search.PHP SQL Injection Vulnerability
     77. PHPCart Input Validation Vulnerability
     78. Claroline E-Learning Application Multiple Remote Input Valid...
     79. BakBone NetVault NVStatsMngr.EXE Local Privilege Escalation ...
     80. Altiris Client Service Local Privilege Escalation Vulnerabil...
     81. S9Y Serendipity BBCode Plugin HTML Injection Vulnerability
     82. Dream4 Koobi CMS Index.PHP P Parameter SQL Injection Vulnera...
     83. Dream4 Koobi CMS Index.PHP Q Parameter SQL Injection Vulnera...
     84. HP OpenView Radia Management Portal Remote Command Execution...
     85. Survivor Unspecified Cross-Site Scripting Vulnerability
     86. Symantec AntiVirus RAR Archive Scan Evasion Denial Of Servic...
     87. Notes Module for PHPBB SQL Injection Vulnerability
     88. Oracle Application Server HTTP Service Mod_Access Restrictio...
     89. Just William's Amazon Webstore Closeup.PHP Image Parameter C...
     90. Oracle Application Server 9i Webcache Arbitrary File Corrupt...
     91. Oracle Application Server 9i Webcache Cache_dump_file Cross-...
     92. Oracle Application Server 9i Webcache PartialPageErrorPage C...
     93. Just William's Amazon Webstore CurrentIsExpanded Parameter C...
     94. Just William's Amazon Webstore SearchFor Parameter Cross-Sit...
     95. Just William's Amazon Webstore CurrentNumber Parameter Cross...
     96. Just William's Amazon Webstore HTTP Response Splitting Vulne...
     97. MyPHP Forum Post.PHP Username Spoofing Vulnerability
     98. MyPHP Forum Privmsg.PHP Username Spoofing Vulnerability
     99. LAM/MPI Runtime For Mandrake Linux Insecure Account Creation...
     100. PHPCoin Multiple SQL Injection Vulnerabilities
III. SECURITYFOCUS NEWS ARTICLES
     1. Backups tapes a backdoor for identity thieves
     2. Microsoft reveals hardware security plans, concerns remain
     3. Privacy watchdog warns job seekers to beware
     4. Police chief withstands spam blitz
     5. SANS revises Top 20 security vulns list
     6. World Cup worm gives Windows users the willies
IV. SECURITYFOCUS TOP 6 TOOLS
     1. LC 5 5
     2. Umbrella v0.6
     3. Auditor security collection 120305-01
     4. Ntprint 0.1a
     5. TFTP bruteforcer 0.1
     6. SNMP fuzzer 0.1.1
V. SECURITYJOBS LIST SUMMARY
     1. [SJ-JOB] Security Engineer, San Bruno, US (Thread)
     2. [SJ-JOB] Technical Support Engineer, Sterling, US (Thread)
     3. [SJ-JOB] Sr. Security Analyst, Wood Dale, US (Thread)
     4. [SJ-JOB] Information Assurance Engineer, McLean, US (Thread)
     5. [SJ-JOB] Information Assurance Engineer, New Orleans... (Thread)
     6. [SJ-JOB] Developer, Beaverton, US (Thread)
     7. [SJ-JOB] CISO, TBC, JP (Thread)
     8. [SJ-JOB] Developer, Broomfield, US (Thread)
     9. [SJ-JOB] Compliance Officer, Warren, US (Thread)
     10. [SJ-JOB] Manager, Information Security, Detroit, US (Thread)
     11. [SJ-JOB] Manager, Information Security, new york, US (Thread)
     12. [SJ-JOB] Security Engineer, Irvine, US (Thread)
     13. [SJ-JOB] Sales Representative, Chicago, US (Thread)
     14. [SJ-JOB] Security Consultant, Cupertino, US (Thread)
     15. [SJ-JOB] Security Consultant, Washington, US (Thread)
VI. INCIDENTS LIST SUMMARY
     1. New variant against phpBB2? (Thread)
     2. Administrivia: RE: Discovering and Stopping Phishing... (Thread)
     3. Suspicious traffic w src & dst port 19161 (Thread)
     4. Discovering and Stopping Phishing/Scam Attacks (Thread)
     5. Re: Discovering and Stopping Phishing/Scam Attacks (Thread)
     6. Netcraft Phishing Pheed (Thread)
     7. Netcraft Phishing Pheed (Was: RE: Discovering and St... (Thread)
VII. VULN-DEV RESEARCH LIST SUMMARY
     1. Black Hat USA 2005 Reminder CFP closing soon! (Thread)
     2. ADV: NetTerm's NetFtpd 4.2.2 Buffer Overflow + PoC E... (Thread)
VIII. MICROSOFT FOCUS LIST SUMMARY
     1. Group membership / Kerberos tickets (Thread)
     2. SecurityFocus Microsoft Newsletter #238 (Thread)
IX. SUN FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-04-26 to 2005-05-03.
X. LINUX FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-04-26 to 2005-05-03.
XI. UNSUBSCRIBE INSTRUCTIONS
XII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Sarbanes Oxley for IT Security?
By Mark Rasch
Sarbanes Oxley seems wholly focused on the accuracy of a company's
financial records and controls around these records, so where does IT
security come into the picture?
http://www.securityfocus.com/columnists/322

2. Cleanliness next to Rootliness
By Daniel Hanson
Linspire's arguments to only run a desktop system as root has everything to
do with privilege seperation, privilege escalation, and some design choices
made along the way.
http://www.securityfocus.com/columnists/321

II. BUGTRAQ SUMMARY
-------------------
1. Black Knight Forum Member.ASP SQL Injection Vulnerability
BugTraq ID: 13327
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13327
Summary:
Black Knight Forum is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
prior to utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

2. Black Knight Forum Forum.ASP SQL Injection Vulnerability
BugTraq ID: 13328
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13328
Summary:
Black Knight Forum is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
prior to utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

3. Black Knight Forum Register.ASP SQL Injection Vulnerability
BugTraq ID: 13329
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13329
Summary:
Black Knight Forum is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
prior to utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

4. CartWIZ AddToCart.ASP SQL Injection Vulnerability
BugTraq ID: 13330
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13330
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

5. CartWIZ ProductCatalogSubCats.ASP SQL Injection Vulnerabilit...
BugTraq ID: 13331
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13331
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

6. CartWIZ ProductDetails.ASP SQL Injection Vulnerability
BugTraq ID: 13332
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13332
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

7. CartWIZ SearchResults.ASP PriceTo Argument SQL Injection Vul...
BugTraq ID: 13333
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13333
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

8. CartWIZ SearchResults.ASP PriceFrom Argument SQL Injection V...
BugTraq ID: 13334
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13334
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

9. CartWIZ SearchResults.ASP IDCategory Argument SQL Injection ...
BugTraq ID: 13335
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13335
Summary:
CartWIZ is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input prior to
utilizing the data in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

10. CartWIZ TellAFriend.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 13336
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13336
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

11. CartWIZ AddToWishlist.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 13337
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13337
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

12. CartWIZ Access.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 13338
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13338
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

13. CartWIZ Error.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 13339
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13339
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

14. CartWIZ Login.ASP Redirect Argument Cross-Site Scripting Vul...
BugTraq ID: 13340
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13340
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

15. CartWIZ Login.ASP Message Argument Cross-Site Scripting Vuln...
BugTraq ID: 13341
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13341
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

16. CartWIZ SearchResults.ASP SKU Argument Cross-Site Scripting ...
BugTraq ID: 13342
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13342
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

17. CartWIZ SearchResults.ASP Name Argument Cross-Site Scripting...
BugTraq ID: 13343
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13343
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

18. PHPBB Profile.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 13344
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13344
Summary:
phpBB is prone to a cross-site scripting vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

19. PHPBB Viewtopic.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 13345
Remote: Yes
Date Published: Apr 23 2005
Relevant URL: http://www.securityfocus.com/bid/13345
Summary:
phpBB is prone to a cross-site scripting vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

20. ACS Blog Administrative Access Authentication Bypass Vulnera...
BugTraq ID: 13346
Remote: Yes
Date Published: Apr 24 2005
Relevant URL: http://www.securityfocus.com/bid/13346
Summary:
ACS Blog is vulnerable to an authentication bypass vulnerability. This issue is
due to a design flaw whereby remote administrative access is granted by a
specific client-side cookie value.

Remote attackers may gain administrative access to the software, potentially
altering, or destroying the data contained in it. Other attacks may also be
possible.

Versions from 0.8 through to 1.1.3, as well as the commercial version are all
reported vulnerable.

21. Affix Bluetooth Protocol Stack Signed Buffer Index Vulnerabi...
BugTraq ID: 13347
Remote: No
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13347
Summary:
A local signed buffer index vulnerability affects Affix Bluetooth Protocol
Stack.  This issue is due to a failure of the affected utility to properly
handle user-supplied buffer size parameters.

This issue may be leveraged by a local attacker to gain escalated privileges on
an affected computer.

22. SNMPPD SNMP Proxy Daemon Remote Format String Vulnerability
BugTraq ID: 13348
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13348
Summary:
A remote format string vulnerability affects the SNMPPD SNMP Proxy Daemon. This
issue is due to a failure of the application to properly sanitize user-supplied
input data prior to using it in a formatted-printing function.

A remote attacker may leverage this issue to execute arbitrary code within the
context of the affected application; this may facilitate unauthorized access and
privilege escalation.

23. IBM WebSphere Application Server Error Page Cross-Site Scrip...
BugTraq ID: 13349
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13349
Summary:
IBM WebSphere is prone to a cross-site scripting vulnerability in default error
message pages.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected Web site. 
This may facilitate the theft of cookie-based authentication credentials; other
attacks are also possible.

IBM WebSphere 6.0 was reported to be prone to this issue; other versions may
also be vulnerable.

24. MailEnable HTTP Authorization Buffer Overflow Vulnerability
BugTraq ID: 13350
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13350
Summary:
MailEnable is prone to a remotely exploitable buffer overflow vulnerability. 
This issue occurs in the server's HTTP Header Field Definitions.

This condition may be leveraged to overwrite sensitive program control
variables, allowing a remote attacker to control execution flow of the server
process.

25. ImageMagick PNM Image Decoding Remote Buffer Overflow Vulner...
BugTraq ID: 13351
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13351
Summary:
A remote, client-side buffer overflow vulnerability affects ImageMagick. This
issue is due to a failure of the application to properly validate the length of
user-supplied strings prior to copying them into static process buffers.

An attacker may exploit this issue to cause the affected application to crash,
potentially destroying unsaved data, ultimately denying service to legitimate
users.

26. PHPMyVisites Part Variable Cross-Site Scripting Vulnerabilit...
BugTraq ID: 13352
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13352
Summary:
phpMyVisites is prone to a cross-site scripting vulnerability. As a result,
attackers may embed hostile HTML and script code in a malicious link to the
affected application. If the link is followed, the code may be rendered by the
victim's browser in the context of the vulnerable site.

Exploitation could allow theft of cookie-based authentication credentials or
other attacks.

27. WoltLab Burning Board PMS.PHP Cross-Site Scripting Vulnerabi...
BugTraq ID: 13353
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13353
Summary:
WoltLab Burning Board is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

28. nProtect Netizen ActiveX Control Arbitrary File Creation Vul...
BugTraq ID: 13354
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13354
Summary:
nProtect Netizen is prone to an arbitrary file creation vulnerability in an
ActiveX control.  A malicious Web site can invoke the ActiveX control to
download a file to a specified location on the file system.

29. SWSoft Confixx Change User SQL Injection Vulnerability
BugTraq ID: 13355
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13355
Summary:
Confixx is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

30. PHPMyVisites Per Variable Cross-Site Scripting Vulnerability
BugTraq ID: 13356
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13356
Summary:
phpMyVisites is prone to a cross-site scripting vulnerability. As a result,
attackers may embed hostile HTML and script code in a malicious link to the
affected application. If the link is followed, the code may be rendered by the
victim's browser in the context of the vulnerable site.

Exploitation could allow theft of cookie-based authentication credentials or
other attacks.

31. PHPMyVisites Site Variable Cross-Site Scripting Vulnerabilit...
BugTraq ID: 13357
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13357
Summary:
phpMyVisites is prone to a cross-site scripting vulnerability. As a result,
attackers may embed hostile HTML and script code in a malicious link to the
affected application. If the link is followed, the code may be rendered by the
victim's browser in the context of the vulnerable site.

Exploitation could allow theft of cookie-based authentication credentials or
other attacks.

32. StorePortal Default.ASP Multiple SQL Injection Vulnerabiliti...
BugTraq ID: 13358
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13358
Summary:
StorePortal is prone to multiple SQL injection vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied input
before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

33. Novell Nsure Audit Remote Denial Of Service Vulnerability
BugTraq ID: 13359
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13359
Summary:
Novell Nsure Audit is prone to a remote denial of service vulnerability. The
issue manifests when the 'Webadmin.exe' executable handles multiple connections
in rapid succession.

When the vulnerability is triggered, the executable will stop responding
effectively denying service for legitimate users.

34. Horde Vacation Remote Cross-Site Scripting Vulnerability
BugTraq ID: 13360
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13360
Summary:
A remote cross-site scripting vulnerability affects Horde Vacation. This issue
is due to a failure of the application to properly sanitize user-supplied input
prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

35. OneWorldStore IDOrder Information Disclosure Vulnerability
BugTraq ID: 13361
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13361
Summary:
OneWorldStore is prone to an information disclosure vulnerability.  This issue
is due to a failure in the application to properly sanitize user-supplied input.

Exploitation of this vulnerability would expose the customer names, as they
appear on credit cards, and their addresses to the attacker.

36. Horde MNemo Remote Cross-Site Scripting Vulnerability
BugTraq ID: 13362
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13362
Summary:
A remote cross-site scripting vulnerability affects Horde Mnemo. This issue is
due to a failure of the application to properly sanitize user-supplied input
prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

37. Horde Nag Remote Cross-Site Scripting Vulnerability
BugTraq ID: 13363
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13363
Summary:
A remote cross-site scripting vulnerability affects Horde Nag. This issue is due
to a failure of the application to properly sanitize user-supplied input prior
to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

38. Horde Chora Remote Cross-Site Scripting Vulnerability
BugTraq ID: 13364
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13364
Summary:
A remote cross-site scripting vulnerability affects Horde Chora. This issue is
due to a failure of the application to properly sanitize user-supplied input
prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

39. Horde Accounts Module Remote Cross-Site Scripting Vulnerabil...
BugTraq ID: 13365
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13365
Summary:
A remote cross-site scripting vulnerability affects Horde Accounts Module. This
issue is due to a failure of the application to properly sanitize user-supplied
input prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

40. Horde Forward Module Remote Cross-Site Scripting Vulnerabili...
BugTraq ID: 13366
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13366
Summary:
A remote cross-site scripting vulnerability affects Horde Forward Module. This
issue is due to a failure of the application to properly sanitize user-supplied
input prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

41. HP-UX ICMP PMTUD Remote Denial Of Service Vulnerability
BugTraq ID: 13367
Remote: Yes
Date Published: Apr 25 2005
Relevant URL: http://www.securityfocus.com/bid/13367
Summary:
Path MTU Discovery (PMTUD) functionality is supported within the ICMP protocol. 

An attack against ICMP PMTUD is reported to affect HP-UX IPV4 based platforms.
By sending a suitable forged ICMP message to a target host, (Type 3, code 4
Fragmentation needed and DF bit set for IPV4 networks), an attacker may reduce
the MTU for a given connection.

A remote attacker may exploit this issue to degrade the performance of TCP
connections and partially deny service for legitimate users.

42. MySQL MaxDB HTTP GET Request Remote Buffer Overflow Vulnerab...
BugTraq ID: 13368
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13368
Summary:
A remote buffer overflow vulnerability affects MySQL MaxDB. This issue is due to
a failure of the application to properly validate the length of user-supplied
strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

43. MySQL MaxDB WebDAV Lock Token Remote Buffer Overflow Vulnera...
BugTraq ID: 13369
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13369
Summary:
A remote buffer overflow vulnerability affects MySQL MaxDB. This issue is due to
a failure of the application to properly validate the length of user-supplied
strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

44. PHPMyVisites Set_Lang File Include Vulnerability
BugTraq ID: 13370
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13370
Summary:
phpMyVisites allows attackers to include arbitrary files.  While it has been
demonstrated that local files may be included through this vulnerability, there
is an unconfirmed possibility of remote file inclusion.

Exploitation could disclose local files, or in the case of remote file
inclusion, let the attacker execute malicious PHP code.

The issue is known to affect phpMyVisites 1.3.  Other versions may also be
affected.

45. Yappa-NG Unspecified Remote File Include Vulnerability
BugTraq ID: 13371
Remote: Yes
Date Published: Apr 24 2005
Relevant URL: http://www.securityfocus.com/bid/13371
Summary:
yappa-ng is prone to a remote file include vulnerability.  This issue may let
remote attackers include and execute malicious remote PHP scripts.

The vendor has not published any specific details about this vulnerability other
than stating that it is addressed in the 2.3.2 security release of the software.

46. Yappa-NG Unspecified Cross-Site Scripting Vulnerability
BugTraq ID: 13372
Remote: Yes
Date Published: Apr 24 2005
Relevant URL: http://www.securityfocus.com/bid/13372
Summary:
yappa-ng is prone to an unspecified cross-site scripting vulnerability.  This
issue may allow for theft of cookie-based authentication credentials or other
attacks.

The vendor has not published any specific details about this vulnerability other
than stating that it is addressed in the 2.3.2 security release of the software.

47. Citrix Program Neighborhood Agent AppCache Buffer Overflow V...
BugTraq ID: 13373
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13373
Summary:
Citrix Program Neighborhood Agent is prone to a buffer overflow.  Successful
exploitation of this vulnerability could allow arbitrary code execution in the
context of the application.

This issue was reported to affect Program Neighborhood Agent for Win32 and
Citrix Metaframe Presentation Server client for WinCE.

48. Invision Power Board QPid Parameter SQL Injection Vulnerabil...
BugTraq ID: 13375
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13375
Summary:
Invision Power Board is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

This issue reportedly affects Invision Power Board version 2.0.1; other versions
may also be vulnerable.

49. MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection...
BugTraq ID: 13376
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13376
Summary:
An SQL injection vulnerability affects MetaCart e-Shop V-8. This issue is due to
a failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

50. MetaCart E-Shop V-8 StrCatalog_NAME Parameter Remote SQL Inj...
BugTraq ID: 13377
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13377
Summary:
An SQL injection vulnerability affects MetaCart e-Shop V-8. This issue is due to
a failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

51. MySQL MaxDB WebDAV IF Parameter Remote Buffer Overflow Vulne...
BugTraq ID: 13378
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13378
Summary:
A remote buffer overflow vulnerability affects MySQL MaxDB. This issue is due to
a failure of the application to properly validate the length of user-supplied
strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

52. Citrix Program Neighborhood Agent Malicious Shortcut Creatio...
BugTraq ID: 13379
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13379
Summary:
Citrix Program Neighborhood Agent is prone to an issue that could allow
malicious code to be executed in the context of the current user.  The Program
Neighborhood Agent allows shortcuts to be created in the Startup folder.  If
this shortcut points to a malicious file, it would be executed the next time the
user starts Windows.

This issue was reported to affect Program Neighborhood Agent for Win32 and
Citrix Metaframe Presentation Server client for WinCE.

53. TCPDump BGP Decoding Routines Denial Of Service Vulnerabilit...
BugTraq ID: 13380
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13380
Summary:
tcpdump is prone to a vulnerability that may allow a remote attacker to cause a
denial of service condition in the software.  The issue occurs due to the way
tcpdump decodes Border Gateway Protocol (BGP) packets.  A remote attacker may
cause the software to enter an infinite loop by sending malformed BGP packets
resulting in the software hanging.  

tcpdump versions up to and including 3.8.3 are reported prone to this issue.

54. GrayCMS Error.PHP Remote File Include Vulnerability
BugTraq ID: 13381
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13381
Summary:
GrayCMS is prone to a remote file include vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.

55. MetaCart2 IntCatalogID Parameter Remote SQL Injection Vulner...
BugTraq ID: 13382
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13382
Summary:
A remote SQL injection vulnerability affects MetaCart2. This issue is due to a
failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

56. MetaCart2 StrSubCatalogID Parameter Remote SQL Injection Vul...
BugTraq ID: 13383
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13383
Summary:
A remote SQL injection vulnerability affects MetaCart2. This issue is due to a
failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

57. MetaCart2 CurCatalogID Parameter Remote SQL Injection Vulner...
BugTraq ID: 13384
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13384
Summary:
A remote SQL injection vulnerability affects MetaCart2. This issue is due to a
failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

58. MetaCart2 strSubCatalog_NAME Parameter Remote SQL Injection ...
BugTraq ID: 13385
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13385
Summary:
A remote SQL injection vulnerability affects MetaCart2. This issue is due to a
failure of the application to properly sanitize user-supplied input prior to
including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

59. Fastream NetFile FTP/Web Server Directory Traversal Variant ...
BugTraq ID: 13388
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13388
Summary:
The NetFile FTP/Web Server is reported prone to a directory traversal
vulnerability due to insufficient sanitization of user-supplied data. This can
allow an attacker to create, view, and delete arbitrary files outside the web
root.

A similar issue was reported in BID 10658.  The fix for that issue did not
properly filter all directory traversal sequences.

This issue is addressed in NetFile version 7.5.0 Beta 7 and above.

60. TCPDump LDP Decoding Routines Denial Of Service Vulnerabilit...
BugTraq ID: 13389
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13389
Summary:
tcpdump is prone to a vulnerability that may allow a remote attacker to cause a
denial of service condition in the software.  The issue occurs due to the way
tcpdump decodes Label Distribution Protocol (LDP) datagrams.  A remote attacker
may cause the software to enter an infinite loop by sending malformed LDP
datagrams resulting in the software hanging.  

tcpdump versions up to and including 3.8.3 are reported prone to this issue.

61. TCPDump RSVP Decoding Routines Denial Of Service Vulnerabili...
BugTraq ID: 13390
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13390
Summary:
tcpdump is prone to a vulnerability that may allow a remote attacker to cause a
denial of service condition in the software.  The issue occurs due to the way
tcpdump decodes Resource ReSerVation Protocol (RSVP) packets.  A remote attacker
may cause the software to enter an infinite loop by sending malformed RSVP
packets resulting in the software hanging.  

tcpdump versions up to and including 3.9.x/CVS are reported prone to this issue.

62. Ethereal RSVP Decoding Routines Denial Of Service Vulnerabil...
BugTraq ID: 13391
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13391
Summary:
Ethereal is prone to a vulnerability that may allow a remote attacker to cause a
denial of service condition in the software.  The issue occurs due to the way
Ethereal decodes Resource ReSerVation Protocol (RSVP) packets.  A remote
attacker may cause the software to enter an infinite loop by sending malformed
RSVP packets resulting in the software hanging.  

Ethereal versions up to and including 0.10.10 are reported prone to this issue.

63. TCPDump ISIS Decoding Routines Denial Of Service Vulnerabili...
BugTraq ID: 13392
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13392
Summary:
tcpdump is prone to a vulnerability that may allow a remote attacker to cause a
denial of service condition in the software.  The issue occurs due to the way
tcpdump decodes Intermediate System to Intermediate System (ISIS) packets.  A
remote attacker may cause the software to enter an infinite loop by sending
malformed ISIS packets resulting in the software hanging.  

tcpdump versions up to and including 3.9.x/CVS are reported prone to this issue.

64. MetaCart2 SearchAction.ASP Multiple SQL Injection Vulnerabil...
BugTraq ID: 13393
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13393
Summary:
MetaCart2 is prone to multiple SQL injection vulnerabilities.  These issues are
due to a failure in the application to properly sanitize user-supplied input
before using it in SQL queries.

An attacker may exploit these issues to manipulate SQL queries to the underlying
database.  This may facilitate the theft of sensitive information, potentially
including authentication credentials, and data corruption.

65. VooDoo Circle BotNet Connection Denial of Service Vulnerabil...
BugTraq ID: 13394
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13394
Summary:
VooDoo cIRCle is affected by a denial of service vulnerability due to improper
handling of BOTNET packets.  A remote attacker with valid access can send a
malicious packet through the BOTNET connection.  The application fails to handle
the malformed packet correctly and crashes.

This vulnerability is reported to affect VooDoo cIRCle versions 1.0.20 through
1.0.32; an upgrade is available.

66. MetaBid Auctions intAuctionID Parameter Remote SQL Injection...
BugTraq ID: 13395
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13395
Summary:
A remote SQL injection vulnerability affects MetaBid Auctions. This issue is due
to a failure of the application to properly sanitize user-supplied input prior
to including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate the theft of sensitive information, potentially
including authentication credentials, and data corruption.

67. Intersoft NetTerm Netftpd USER Buffer Overflow Vulnerability
BugTraq ID: 13396
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13396
Summary:
Netftpd is prone to a buffer overflow in the USER command.  When an abnormally
long string is sent to the command, an internal buffer is overrun, potentially
allowing for the execution of arbitrary code.

68. BBlog Index.PHP HTML Injection Vulnerability
BugTraq ID: 13397
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13397
Summary:
bBlog is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be able to access properties of the
site, potentially allowing for theft of cookie-based authentication credentials.
An attacker could also exploit this issue to control how the site is rendered to
the user; other attacks are also possible.

69. BBlog PostID Parameter SQL Injection Vulnerability
BugTraq ID: 13398
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13398
Summary:
bBlog is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

70. Rootkit Hunter Local Insecure Temporary File Creation Vulner...
BugTraq ID: 13399
Remote: No
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13399
Summary:
A local insecure file creation vulnerability affects Rootkit Hunter. This issue
is due to a design error that causes a file to be insecurely opened or created
and subsequently written to.

An attacker may leverage this issue to corrupt arbitrary files with the
privileges of an unsuspecting user that activates the affected application.

71. BEA WebLogic Server And WebLogic Express Administration Cons...
BugTraq ID: 13400
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13400
Summary:
A remote cross-site scripting vulnerability affects BEA WebLogic Server and
WebLogic Express administration console. This issue is due to a failure of the
application to properly sanitize user-supplied input prior to including it in
dynamically generated Web content. 

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

72. Convert-UUlib Perl Module Buffer Overflow Vulnerability
BugTraq ID: 13401
Remote: Yes
Date Published: Apr 26 2005
Relevant URL: http://www.securityfocus.com/bid/13401
Summary:
Convert-UUlib Perl module is prone to a remotely exploitable buffer overflow
vulnerability. 

This condition may be leveraged to overwrite sensitive program control
variables, allowing a remote attacker to control execution flow of the process.

This BID will be updated as soon as further information regarding this issue is
made available.

73. Debian CVS-Repouid Remote Authentication Bypass Vulnerabilit...
BugTraq ID: 13402
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13402
Summary:
A remote authentication bypass vulnerability affects Debian CVS.  This issue is
due to an error with Debian's CVS cvs-repouid patch.

A remote attacker may leverage this issue to bypass CVS authentication
requirements and gain unauthorized access to a vulnerable repository.

74. Debian CVS-Repouid Denial Of Service Vulnerability
BugTraq ID: 13403
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13403
Summary:
A denial of service vulnerability affects Debian CVS.  This issue is due to an
error with Debian's CVS cvs-repouid patch.

A remote attacker may leverage this issue to cause the CVS process to crash,
effectively denying service to legitimate users.

75. ABCZone.IT WWWGuestBook Login.ASP SQL Injection Vulnerabilit...
BugTraq ID: 13404
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13404
Summary:
WWWGuestBook is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

76. PHP-Calendar Search.PHP SQL Injection Vulnerability
BugTraq ID: 13405
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13405
Summary:
PHP-Calendar is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

The vendor has addressed this issue in PHP-Calendar 0.10.3; earlier versions are
reported vulnerable.

77. PHPCart Input Validation Vulnerability
BugTraq ID: 13406
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13406
Summary:
PHPCart is prone to a remote input validation vulnerability. The issue exists
because the software fails to sufficiently sanitize URI parameter data that is
employed when computing product charges.

A remote attacker may exploit this issue to manipulate invoice and payment
charges for a specific PHPCart order.

78. Claroline E-Learning Application Multiple Remote Input Valid...
BugTraq ID: 13407
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13407
Summary:
Multiple remote input validation vulnerabilities affect Claroline e-Learning
Application. These issues are due to a failure of the application to properly
sanitize user-supplied input prior to using it to carry out critical application
functionality such as database interaction and generating dynamic Web content. 

Multiple cross-site scripting, SQL injection, directory traversal, and remote
file include vulnerabilities have been reported.

An attacker may exploit these issues to manipulate SQL queries to the underlying
database, have arbitrary script code executed in the browser of an unsuspecting
user, and execute arbitrary server-side scripts with the privileges of an
affected Web server.  This may facilitate the theft of sensitive information,
potentially including authentication credentials, data corruption, and a
compromise of the affected computer.

79. BakBone NetVault NVStatsMngr.EXE Local Privilege Escalation ...
BugTraq ID: 13408
Remote: No
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13408
Summary:
BakBone NetVault is affected by a local privilege escalation vulnerability.  A
local user can manipulate 'nvstatsmngr.exe' to escalate privileges to that of
the LocalSystem account. 

An attacker can exploit this vulnerability to gain SYSTEM level privileges on an
affected computer.

80. Altiris Client Service Local Privilege Escalation Vulnerabil...
BugTraq ID: 13409
Remote: No
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13409
Summary:
A local privilege escalation vulnerability affects the Altiris Client Service. 
This issue is due to a failure of the application to properly secure access to
privileged interfaces.

An attacker may leverage this issue to gain SYSTEM level privileges on an
affected computer.

81. S9Y Serendipity BBCode Plugin HTML Injection Vulnerability
BugTraq ID: 13411
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13411
Summary:
Serendipity is affected by an HTML injection vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input before
using it in dynamically generated content.

Attacker-supplied HTML and script code would be able to access properties of the
site, potentially allowing for theft of cookie-based authentication credentials.
An attacker could also exploit this issue to control how the site is rendered to
the user; other attacks are also possible.

82. Dream4 Koobi CMS Index.PHP P Parameter SQL Injection Vulnera...
BugTraq ID: 13412
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13412
Summary:
Koobi CMS is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

83. Dream4 Koobi CMS Index.PHP Q Parameter SQL Injection Vulnera...
BugTraq ID: 13413
Remote: Yes
Date Published: Apr 27 2005
Relevant URL: http://www.securityfocus.com/bid/13413
Summary:
Koobi CMS is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

84. HP OpenView Radia Management Portal Remote Command Execution...
BugTraq ID: 13414
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13414
Summary:
A remote command execution vulnerability affects HP OpenView Radia Management
Portal. This issue is due to a failure of the application to properly secure
access to critical functionality.

An unauthenticated, remote attacker may leverage this issue to execute arbitrary
commands on an affected computer with SYSTEM privileges on the Microsoft Windows
platform and elevated privileges on UNIX-based platforms.

85. Survivor Unspecified Cross-Site Scripting Vulnerability
BugTraq ID: 13415
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13415
Summary:
Survivor is prone to an unspecified cross-site scripting vulnerability.  This
issue may allow for theft of cookie-based authentication credentials or other
attacks.

86. Symantec AntiVirus RAR Archive Scan Evasion Denial Of Servic...
BugTraq ID: 13416
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13416
Summary:
A scan evasion denial of service vulnerability affects Symantec AntiVirus.  This
issue is due to a failure of the application to properly handle malformed files.

An attacker may leverage this issue to crash the file scanner of the affected
antivirus software, causing the file scanner to fail to detect malicious code
contained therein.

87. Notes Module for PHPBB SQL Injection Vulnerability
BugTraq ID: 13417
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13417
Summary:
The notes module for phpBB is prone to an SQL injection vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

88. Oracle Application Server HTTP Service Mod_Access Restrictio...
BugTraq ID: 13418
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13418
Summary:
Oracle HTTP Server(OHS) of Oracle Application Server is prone to an access
restriction bypass vulnerability. 

It is possible to configure a list of forbidden URIs in OHS. This is
accomplished using 'mod_access'. A URI that is listed is not supposed to be
accessible to certain clients, depending on the configuration. However, reports
indicate that the Oracle Webcache client may be used to access URIs regardless
of the restrictions outlined in OHS 'mod_access'.

89. Just William's Amazon Webstore Closeup.PHP Image Parameter C...
BugTraq ID: 13419
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13419
Summary:
Amazon Webstore is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue reportedly affects Amazon Webstore version 04050100; other versions
may also be vulnerable.

90. Oracle Application Server 9i Webcache Arbitrary File Corrupt...
BugTraq ID: 13420
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13420
Summary:
Oracle Application Server 9i Webcache is prone to an arbitrary file corruption
vulnerability.

The issue exists becaue dangerous characters are not removed from a certain
parameter value, allowing an attacker to construct a URI that contains an
absolute path to any target file.

If this URI is followed by a user with sufficient privileges, garbage data is
appended to the end of the specified file.

91. Oracle Application Server 9i Webcache Cache_dump_file Cross-...
BugTraq ID: 13421
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13421
Summary:
A remote cross-site scripting vulnerability affects the Oracle Application
Server 9i Webcache administration console. This issue is due to a failure of the
application to properly sanitize user-supplied input prior to including it in
dynamically generated Web content. 

The issue affects the 'cache_dump_file' parameter of the 'webcacheadmin' script.

92. Oracle Application Server 9i Webcache PartialPageErrorPage C...
BugTraq ID: 13422
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13422
Summary:
A remote cross-site scripting vulnerability affects the Oracle Application
Server 9i Webcache administration console. This issue is due to a failure of the
application to properly sanitize user-supplied input prior to including it in
dynamically generated Web content. 

The issue affects the 'PartialPageErrorPage' parameter of the 'webcacheadmin'
script.

93. Just William's Amazon Webstore CurrentIsExpanded Parameter C...
BugTraq ID: 13425
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13425
Summary:
Amazon Webstore is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue reportedly affects Amazon Webstore version 04050100; other versions
may also be vulnerable.

94. Just William's Amazon Webstore SearchFor Parameter Cross-Sit...
BugTraq ID: 13426
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13426
Summary:
Amazon Webstore is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue reportedly affects Amazon Webstore version 04050100; other versions
may also be vulnerable.

95. Just William's Amazon Webstore CurrentNumber Parameter Cross...
BugTraq ID: 13427
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13427
Summary:
Amazon Webstore is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue reportedly affects Amazon Webstore version 04050100; other versions
may also be vulnerable.

96. Just William's Amazon Webstore HTTP Response Splitting Vulne...
BugTraq ID: 13428
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13428
Summary:
Amazon Webstore is prone to a HTTP response splitting vulnerability.  This issue
is due to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent
how Web content is served, cached or interpreted. This could aid in various
attacks that attempt to entice client users into a false sense of trust.

This issue reportedly affects Amazon Webstore version 04050100; other versions
may also be vulnerable.

97. MyPHP Forum Post.PHP Username Spoofing Vulnerability
BugTraq ID: 13429
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13429
Summary:
MyPHP Forum is prone to a username spoofing vulnerability. The issue exists due
to a design error, where a user may arbitrarily specify their username as a
value for a URI parameter while submitting a message to the forum.

An attacker may exploit this issue to spoof forum messages from other,
potentially trusted, users.

98. MyPHP Forum Privmsg.PHP Username Spoofing Vulnerability
BugTraq ID: 13430
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13430
Summary:
MyPHP Forum is prone to a username spoofing vulnerability. The issue exists due
to a design error, where a user may arbitrarily specify their username as a
value for a URI parameter while submitting a message to the forum.

An attacker may exploit this issue to spoof forum messages from other,
potentially trusted, users.

99. LAM/MPI Runtime For Mandrake Linux Insecure Account Creation...
BugTraq ID: 13431
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13431
Summary:
The LAM/MPI Runtime environment for Mandrake Linux is prone to an insecure
account creation vulnerability. The package creates an account 'mpi' without a
corresponding password during installation.

100. PHPCoin Multiple SQL Injection Vulnerabilities
BugTraq ID: 13433
Remote: Yes
Date Published: Apr 28 2005
Relevant URL: http://www.securityfocus.com/bid/13433
Summary:
PHPCoin is reportedly affected by multiple SQL injection vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Backups tapes a backdoor for identity thieves
By: Robert Lemos

The majority of firms don't encrypt backup tapes. But that could change as
companies consider better backup security policies.
http://www.securityfocus.com/news/11048

2. Microsoft reveals hardware security plans, concerns remain
By: Robert Lemos

The next version of Windows will have security features to take advantage of
trusted computing hardware, but worries remain that companies may use the
technology to lock users into their products.
http://www.securityfocus.com/news/11005

3. Privacy watchdog warns job seekers to beware
By: Robert Lemos

Would-be workers need to be more cautious with resume services and posting their
personal information online. Online fraudsters and scammers are waiting. 
http://www.securityfocus.com/news/10976

4. Police chief withstands spam blitz
By: John Leyden, The Register

Greater Manchester's top policeman was deluged with thousands of junk mails last
week in an apparent attempt to disrupt police communications.
http://www.securityfocus.com/news/11074

5. SANS revises Top 20 security vulns list
By: John Leyden, The Register

Bugs in anti-virus scanners and various media players joined flaws in Microsoft
and Oracle software products in a list of the 20 most serious vulnerabilities
discovered the first quarter of 2005.
http://www.securityfocus.com/news/11073

6. World Cup worm gives Windows users the willies
By: John Leyden, The Register

A new version of the increasingly tedious Sober email worm series is ensnaring
victims by posing as an email from the next year's World Cup organising
committee.
http://www.securityfocus.com/news/11072

IV. SECURITYFOCUS TOP 6 TOOLS
-----------------------------
1. LC 5 5
By: @stake
Relevant URL: http://www.atstake.com/products/lc/
Platforms: Windows 2000, Windows 95/98, Windows NT
Summary: 

LC 5 is the latest version of L0phtCrack, the award-winning password auditing
and recovery application used by thousands of companies worldwide.

Using multiple assessment methods, LC 5 reduces security risk by helping
administrators to:

    * Identify and remediate security vulnerabilities that result from the use
of weak or easily guessed passwords
    * Recover Windows and Unix account passwords to access user and
administrator accounts whose passwords are lost or to streamline migration of
users to another authentication system
    * Rapidly process accounts using pre-computed password tables* that contain
trillions of passwords

2. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary: 

Umbrella is a security mechanism that implements a combination of Process-Based
Access Control (PBAC) and authentication of binaries through Digital Signed
Binaries (DSB). The scheme is designed for Linux-based consumer electronic
devices ranging from mobile phones to settop boxes.

Umbrella is implemented on top of the Linux Security Modules (LSM) framework.
The PBAC scheme is enforced by a set of restrictions on each process.

3. Auditor security collection 120305-01
By: Max Moser
Relevant URL: http://www.remote-exploit.org/
Platforms: Os Independent
Summary: 

The Auditor security collection is a Live-System based on KNOPPIX. With no
installation whatsoever, the analysis platform is started directly from the
CD-Rom and is fully accessible within minutes. Independent of the hardware in
use, the Auditor security collection offers a standardised working environment,
so that the build-up of know-how and remote support is made easier.

4. Ntprint 0.1a
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Small NTP fingerprinter to find a remote host OS via an NTP server.

5. TFTP bruteforcer 0.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Fast TFTP bruteforcer to guess the names of files stored on remote TFTP servers
(such as router configs).

6. SNMP fuzzer 0.1.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

SNMP fuzzing tool to discover SNMP implementation vulnerabilities and perform
SNMP agent stress testing.

V. SECURITYJOBS LIST SUMMARY
----------------------------
1. [SJ-JOB] Security Engineer, San Bruno, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397232

2. [SJ-JOB] Technical Support Engineer, Sterling, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397231

3. [SJ-JOB] Sr. Security Analyst, Wood Dale, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397230

4. [SJ-JOB] Information Assurance Engineer, McLean, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397094

5. [SJ-JOB] Information Assurance Engineer, New Orleans... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397093

6. [SJ-JOB] Developer, Beaverton, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397092

7. [SJ-JOB] CISO, TBC, JP (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397091

8. [SJ-JOB] Developer, Broomfield, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397090

9. [SJ-JOB] Compliance Officer, Warren, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397013

10. [SJ-JOB] Manager, Information Security, Detroit, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397012

11. [SJ-JOB] Manager, Information Security, new york, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397011

12. [SJ-JOB] Security Engineer, Irvine, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397010

13. [SJ-JOB] Sales Representative, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396967

14. [SJ-JOB] Security Consultant, Cupertino, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396965

15. [SJ-JOB] Security Consultant, Washington, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396963

VI. INCIDENTS LIST SUMMARY
--------------------------
1. New variant against phpBB2? (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397275

2. Administrivia: RE: Discovering and Stopping Phishing... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397227

3. Suspicious traffic w src & dst port 19161 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397222

4. Discovering and Stopping Phishing/Scam Attacks (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397189

5. Re: Discovering and Stopping Phishing/Scam Attacks (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397087

6. Netcraft Phishing Pheed (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397038

7. Netcraft Phishing Pheed (Was: RE: Discovering and St... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/397003

VII. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Black Hat USA 2005 Reminder CFP closing soon! (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/396985

2. ADV: NetTerm's NetFtpd 4.2.2 Buffer Overflow + PoC E... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/396931

VIII. MICROSOFT FOCUS LIST SUMMARY
----------------------------------
1. Group membership / Kerberos tickets (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/397228

2. SecurityFocus Microsoft Newsletter #238 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/397160

IX. SUN FOCUS LIST SUMMARY
--------------------------
NO NEW POSTS FOR THE WEEK 2005-04-26 to 2005-05-03.

X. LINUX FOCUS LIST SUMMARY
---------------------------
NO NEW POSTS FOR THE WEEK 2005-04-26 to 2005-05-03.
[ terug ]