----------------------------------------
This Issue is Sponsored by: Watchfire
As web applications become increasingly complex, tremendous amounts of sensitive data - including personal, medical and financial information - are exchanged, and stored. This paper examines a few vulnerability detection methods - specifically comparing and contrasting manual penetration testing with automated scanning tools. Download Watchfire's "Web Application Security: Automated Scanning or Manual Penetration Testing?" whitepaper today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008YSk
------------------------------------------------------------------
I. FRONT AND CENTER
1. Using Nepenthes Honeypots to Detect Common Malware
2. Employee Privacy, Employer Policy
II. BUGTRAQ SUMMARY
1. IBM Websphere Application Server Multiple Vulnerabilities
2. X.Org X Window Server LibX11 Xinput File Descriptor Leak Vulnerability
3. Modx CMS Thumbnail.PHP Remote File Include Vulnerability
4. Trolltech QT Pixmap Images Integer Overflow Vulnerability
5. XM Easy Personal FTP Server Password Buffer Overflow Vulnerability
6. Simplog BlogID Parameter Multiple SQL Injection Vulnerabilities
7. Yukihiro Matsumoto Ruby CGI Module MIME Denial Of Service Vulnerability
8. PostNuke PNUser.PHP Local File Include Vulnerability
9. NVidia Binary Graphics Driver For Linux Buffer Overflow Vulnerability
10. Arkoon SSL360 Unspecified Cross-Site Scripting Vulnerability
11. RapidKill Arbitrary File Upload Vulnerability
12. Linux Kernel ATM SkBuff Dereference Remote Denial of Service Vulnerability
13. Macromedia Sitespring Default Error Page Cross Site Scripting Vulnerability
14. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
15. Mobile Multiple Cross-Site Scripting Vulnerabilities
16. Gepi Savebackup.PHP Remote File Include Vulnerability
17. Lat2Cyr Lat2Cyr.PHP Remote File Include Vulnerability
18. Yazd Discussion Forum Insecure Default Permission Handling Vulnerabilities
19. MyBulletinBoard Generic_Error.PHP Multiple Cross-Site Scripting Vulnerabilities
20. PHPATM Multiple Remote File Include Vulnerabilities
21. SMF Multiple SQL Injection Vulnerabilities
22. Article System Volume.PHP Remote File Include Vulnerability
23. TWiki Viewfile Directory Traversal Vulnerability
24. PADL Software Pam_Ldap PasswordPolicyResponse Authentication Bypass Vulnerability
25. FreeWebShop Index.PHP Directory Traversal Vulnerability
26. ImageMagick Sun Bitmap Image File Remote Unspecified Buffer Overflow Vulnerability
27. Webdrivers Simple Forum Message_details.PHP SQL Injection Vulnerability
28. Adobe Flash Player Multiple Remote Code Execution Vulnerabilities
29. Macromedia Flash Malformed SWF File Multiple Vulnerabilities
30. LibRPM Query Report Arbitrary Code Execution Vulnerability
31. Microsoft Office Embedded Shockwave Flash Object Security Bypass Weakness
32. America Online ICQ ActiveX Control Remote Code Execution Vulnerability
33. PHP Multiple Input Validation Vulnerabilities
34. PHP Group Exif Module Infinite Recursion Denial Of Service Vulnerability
35. Ultimate PHP Board Header_simple.PHP Remote File Include Vulnerability
36. PHP Multiple Unspecified Vulnerabilities
37. DeltaScripts PHP Classifieds Detail.PHP SQL Injection Vulnerability
38. X.Org LibXfont CID Font File Multiple Integer Overflow Vulnerabilities
39. AIOCP Multiple Input Validation Vulnerabilities
40. Iodine DNS Response Stack Buffer Overflow Vulnerability
41. MX Smartor Album Module Album.PHP Remote File Include Vulnerability
42. Xoops NewList.PHP Cross-Site Scripting Vulnerability
43. Article Script RSS.PHP SQL Injection Vulnerability
44. @cid Stats Install.PHP3 Remote File Include Vulnerability
45. Cyberfolio Multiple Remote File Include Vulnerabilities
46. EggBlog Multiple HTML Injection Vulnerabilities
47. Microsoft XML Core Service XMLHTTP ActiveX Control Remote Code Execution Vulnerability
48. OpenBSD ISAKMPD IPsec Replay Vulnerability
49. SpearTek Search Module Cross-Site Scripting Vulnerability
50. SAP Web Application Server Remote Denial of Service Vulnerability
51. SAP Web Application Server Remote Information Disclosure Vulnerability
52. Docmint Required.php Remote File Include Vulnerability
53. FreeWebShop Index.PHP SQL Injection Vulnerability
54. Mozilla Multiple Products Remote Vulnerabilities
55. OpenSSL PKCS Padding RSA Signature Forgery Vulnerability
56. OpenSolution Quick.Cms.Lite Local File Include Vulnerability
57. SazCart CART.PHP Remote File Include Vulnerability
58. Sun Solaris 10 UFS Local Denial of Service Vulnerability
59. JaxUltraBB Delete.PHP HTML Injection Vulnerability
60. GNU Mailman Multiple Security Vulnerabilities
61. PHPDynaSite Multiple Remote File Include Vulnerabilities
62. FreeBSD UFS Filesystem Local Integer Overflow Vulnerability
63. Web Wiz Forum Search.ASP SQL Injection Vulnerability
64. Easy Gallery Doc_Directory Parameter Multiple Remote File Include Vulnerabilities
65. Drake CMS XHTML.PHP Remote File Include Vulnerability
66. e107 GSitemap.PHP Local File Include Vulnerability
67. Retired: PHPWebSite PHPWS_SOURCE_DIR Parameter Multiple Remote File Include Vulnerabilities
68. MDPro PNSVLang Parameter Local File Include Vulnerability
69. Easy Doc Doc_Directory Parameter Multiple Remote File Include Vulnerabilities
70. PHPKit Popup.PHP SQL Injection Vulnerability
71. Freenews Moteur.PHP Remote File Include Vulnerability
72. PAFileDB ID Variable Cross-Site Scripting Vulnerability
73. HazirSite Giris_Yap.ASP SQL Injection Vulnerability
74. IF-CMS Index.PHP Cross-Site Scripting Vulnerability
75. Sun Secure Global Desktop Unspecified Multiple Input Validation Vulnerabilities
76. PHP HTMLEntities HTMLSpecialChars Buffer Overflow Vulnerabilities
77. IMlib2 Library Multiple Image Format Arbitrary Code Execution Vulnerabilities
78. Linux Kernel ISO9660 Denial of Service Vulnerability
79. Xenis.creator CMS Multiple Input Validation Vulnerabilities
80. Linux Kernel Multiple IPV6 Packet Filtering Bypass Vulnerabilities
81. Kayako SupportSuite Index.PHP Cross-Site Scripting Vulnerability
82. OWFS Owserver File Path Denial of Service Vulnerability
83. IPManager Index.PHP Cross-Site Scripting Vulnerability
84. IPrimal Forums Index.PHP Authentication Bypass Vulnerability
85. GreenBeast CMS Up_Loader.PHP Arbitrary File Upload Vulnerability
86. Hyper NIKKI System Unspecified Cross-Site Scripting Vulnerability
87. iWare Professional Remote Code Execution Vulnerability
88. WarFTPD Multiple Format String Vulnerabilities
89. WFTPD Server APPE Command Buffer Overflow Vulnerability
90. Essentia Web Server GET And HEAD Requests Remote Buffer Overflow Vulnerability
91. NewP News Publishing System Class.Database.PHP Remote File Include Vulnerability
92. Admin.Tool CMS Multiple Cross-Site Scripting Vulnerabilities
93. WebSpell Index.PHP SQL Injection Vulnerability
94. Advanced GuestBook Admin.PHP Remote File Include Vulnerability
95. RETIRED: Ariadne CMS Multiple Remote File Include Vulnerabilities
96. Simplog Multiple HTML Injection Vulnerabilities
97. PhpBB XS Multiple Remote File Include Vulnerabilities
98. Simplog Archive.PHP PID Parameter Cross-Site Scripting Vulnerability
99. E-Vision CMS Multiple Input Validation Vulnerabilities.
100. PHPQuestionnaire Ifunction.PHP Remote File Include Vulnerability
III. SECURITYFOCUS NEWS
1. Attackers end-run around IE security
2. Quantum attacks worry computer scientists
3. Bot nets likely behind jump in spam
4. Researcher attempts to shed light on security troll
IV. SECURITY JOBS LIST SUMMARY
1. [SJ-JOB] Sales Representative, Alexandria
2. [SJ-JOB] Security Engineer, Alexandria
3. [SJ-JOB] Sr. Security Analyst, Alexandria
4. [SJ-JOB] Sales Engineer, Bay Area
5. [SJ-JOB] Senior Software Engineer, Austin
6. [SJ-JOB] Sr. Security Analyst, London
7. [SJ-JOB] Sr. Security Engineer, Cupertino
8. [SJ-JOB] Security Consultant, M4 Corridor
9. [SJ-JOB] Forensics Engineer, Richmond
10. [SJ-JOB] Sr. Security Analyst, London
11. [SJ-JOB] Quality Assurance, Redwood Shores
12. [SJ-JOB] Security Engineer, Bangalore
13. [SJ-JOB] Software Engineer, Redwood Shores
14. [SJ-JOB] Senior Software Engineer, Redwood Shores
15. [SJ-JOB] Customer Support, Redwood Shores
16. [SJ-JOB] Account Manager, London
17. [SJ-JOB] Management, San Jose
18. [SJ-JOB] Security Architect, Washington
19. [SJ-JOB] Application Security Architect, San Jose
20. [SJ-JOB] Technology Risk Consultant, San Jose
21. [SJ-JOB] Security Engineer, New YOrk
22. [SJ-JOB] Technology Risk Consultant, San Francisco
23. [SJ-JOB] Security Engineer, New York
24. [SJ-JOB] Application Security Architect, Washington
25. [SJ-JOB] Security Researcher, San Diego
26. [SJ-JOB] Technical Support Engineer, Napa
27. [SJ-JOB] Security Product Marketing Manager, San Diego
28. [SJ-JOB] Security Product Manager, San Diego
29. [SJ-JOB] Sr. Product Manager, San Diego
30. [SJ-JOB] Sales Engineer, Superior
31. [SJ-JOB] Security System Administrator, New York
32. [SJ-JOB] Sr. Security Engineer, Herndon
33. [SJ-JOB] Security Researcher, Silicon Valley
34. [SJ-JOB] Sales Engineer, New York
35. [SJ-JOB] Sales Engineer, New York
36. [SJ-JOB] Sales Engineer, Boston
37. [SJ-JOB] Sales Engineer, Chicago
38. [SJ-JOB] Sales Engineer, Chicago
39. [SJ-JOB] Sales Engineer, Seattle
40. [SJ-JOB] Sales Engineer, Washington
41. [SJ-JOB] Sales Representative, Napa
42. [SJ-JOB] Sales Engineer, Vacaville
43. [SJ-JOB] Forensics Engineer, Denver
44. [SJ-JOB] Security Engineer, Denver
45. [SJ-JOB] Incident Handler, New York
46. [SJ-JOB] Information Assurance Engineer, Denver
47. [SJ-JOB] Jr. Security Analyst, Denver
48. [SJ-JOB] Security Product Manager, Denver
49. [SJ-JOB] Security Architect, Denver
50. [SJ-JOB] Auditor, Denver
51. [SJ-JOB] Chief Security Strategist, Denver
52. [SJ-JOB] Incident Handler, D.C. Metro area
53. [SJ-JOB] Sales Representative, Singapore
54. [SJ-JOB] Security Engineer, London
55. [SJ-JOB] Auditor, Miami
56. [SJ-JOB] Sales Engineer, Washington
57. [SJ-JOB] Auditor, Washington, DC
58. [SJ-JOB] Sales Engineer, New York
59. [SJ-JOB] Sales Engineer, New York
60. [SJ-JOB] Product Strategist, Newark
61. [SJ-JOB] Manager, Information Security, New York
62. [SJ-JOB] Auditor, Boston
63. [SJ-JOB] Sales Engineer, Hoboken
64. [SJ-JOB] Sr. Security Analyst, Richmond
V. INCIDENTS LIST SUMMARY
VI. VULN-DEV RESEARCH LIST SUMMARY
1. SinFP 2.04 release, works under Windows
2. EUSecWest/London CFP extended to Nov. 7
3. IE7 SELECT Tag
VII. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #315
2. IIS Security
VIII. SUN FOCUS LIST SUMMARY
1. Solaris 10 necessary file question
IX. LINUX FOCUS LIST SUMMARY
1. Vulnerability Assessment of a EAL 4 system
X. UNSUBSCRIBE INSTRUCTIONS
XI. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Using Nepenthes Honeypots to Detect Common Malware
By Jamie Riden
This article describes the use of Nepenthes, a low-interaction honeypot, as an additional layer of network defense. Nepenthes can be used to capture malware, alert an administrator about a network compromise, and assist in containing and removing the infection.
http://www.securityfocus.com/infocus/1880
2. Employee Privacy, Employer Policy
By Kelly Martin
Following the 2006 International Virus Bulletin Conference, Kelly Martin takes a look at the profit motives of the cyber criminals behind modern viruses, targeted trojans, phishing scams and botnet attacks that are stealing millions from organizations and individuals.
http://www.securityfocus.com/columnists/419
II. BUGTRAQ SUMMARY
--------------------
1. IBM Websphere Application Server Multiple Vulnerabilities
BugTraq ID: 17919
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/17919
Summary:
IBM Websphere Application Server is prone to multiple vulnerabilities.
These issues include vulnerabilities of unknown impact, information-disclosure vulnerabilities, and security-bypass vulnerabilities.
Other potentially security-related issues were also addressed.
2. X.Org X Window Server LibX11 Xinput File Descriptor Leak Vulnerability
BugTraq ID: 20845
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20845
Summary:
X.Org X Window Server libX11 library 'Xinput' module is prone to a file-descriptor leak due to a design error.
The vulnerability arises because the application fails to close a file descriptor after file operations. An attacker can exploit this issue to open files with elevated privileges.
Versions 1.0.2 and 1.0.3 of libX11 are reported affected; other versions may be affected as well.
3. Modx CMS Thumbnail.PHP Remote File Include Vulnerability
BugTraq ID: 20898
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20898
Summary:
MODx CMS is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
MODx CMS 0.9.2.1 and prior versions are vulnerable.
4. Trolltech QT Pixmap Images Integer Overflow Vulnerability
BugTraq ID: 20599
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20599
Summary:
Qt is prone to an integer-overflow vulnerability because the library fails to do proper bounds checking on user-supplied data.
An attacker can exploit this vulnerability to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will likely cause denial-of-service conditions.
5. XM Easy Personal FTP Server Password Buffer Overflow Vulnerability
BugTraq ID: 18711
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/18711
Summary:
XM Easy Personal FTP Server is prone to a buffer-overflow vulnerability. A buffer may be overrun with attacker-supplied data.
Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the ftp server application. Failed exploit attempts will likely crash applications, denying service to legitimate users.
6. Simplog BlogID Parameter Multiple SQL Injection Vulnerabilities
BugTraq ID: 20899
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20899
Summary:
Simplog is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
These issues affect version 0.9.3; other versions may also be vulnerable.
7. Yukihiro Matsumoto Ruby CGI Module MIME Denial Of Service Vulnerability
BugTraq ID: 20777
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20777
Summary:
Ruby is prone to a remote denial-of-service vulnerability because the application's CGI module fails to properly handle specific HTTP requests that contain invalid information.
Successful exploits may allow remote attackers to cause denial-of-service conditions on computers running the affected Ruby CGI Module.
8. PostNuke PNUser.PHP Local File Include Vulnerability
BugTraq ID: 20897
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20897
Summary:
PostNuke is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
PostNuke 0.763 and prior versions are vulnerable to this issue.
9. NVidia Binary Graphics Driver For Linux Buffer Overflow Vulnerability
BugTraq ID: 20559
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20559
Summary:
The NVIDIA binary graphics driver is prone to a buffer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code with superuser privileges, completely compromising the affected computer. Failed exploit attempts will result in a denial-of-service.
NVidia Driver for Linux versions 8774 and 8762 are vulnerable to this issue; other versions may also be affected.
10. Arkoon SSL360 Unspecified Cross-Site Scripting Vulnerability
BugTraq ID: 20890
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20890
Summary:
Arkoon SSL360 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Arkoon 2.0/2 and prior versions are vulnerable to this issue.
11. RapidKill Arbitrary File Upload Vulnerability
BugTraq ID: 20896
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20896
Summary:
RapidKill is prone to an arbitrary file-upload vulnerability.
An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process.
Version 5.7 is vulnerable to this issue; other versions may also be affected.
12. Linux Kernel ATM SkBuff Dereference Remote Denial of Service Vulnerability
BugTraq ID: 20363
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20363
Summary:
The Linux kernel is prone to a remote denial-of-service vulnerability.
This issue is triggered when the kernel processes incoming ATM data.
Exploiting this vulnerability may allow remote attackers to crash the affected kernel, resulting in denial-of-service conditions.
This issue affects only systems that have ATM hardware and are configured for ATM kernel support.
Kernel versions from 2.6.0 up to and including 2.6.17 are vulnerable to this issue.
13. Macromedia Sitespring Default Error Page Cross Site Scripting Vulnerability
BugTraq ID: 5249
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/5249
Summary:
Macromedia Sitespring is a J2EE-compliant product for managing website production. The Macromedia Sitespring server runs on Microsoft Windows operating systems.
A cross-site scripting issue has been reported in the default error page used by Sitespring. When an HTTP 500 error is returned, some user-supplied data is included in the generated HTML. Since this data isn't properly sanitized, an attacker may be able to include arbitrary HTML, including JavaScript.
14. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
BugTraq ID: 13491
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/13491
Summary:
Apple Mac OS X is prone to a directory-traversal vulnerability. Since the software fails to sufficiently sanitize input, a remote attacker could use the Bluetooth file- and object-exchange services to access files outside the default file-exchange directory.
This issue was initially reported in BID 13480 (Apple Mac OS X Multiple Vulnerabilities). Due to the availability of more information, this issue is being assigned a new BID.
15. Mobile Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20895
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20895
Summary:
Mobile is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
16. Gepi Savebackup.PHP Remote File Include Vulnerability
BugTraq ID: 20830
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20830
Summary:
Gepi is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 1.4.0 is vulnerable to this issue; other versions may also be affected.
17. Lat2Cyr Lat2Cyr.PHP Remote File Include Vulnerability
BugTraq ID: 20513
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20513
Summary:
The lat2cyr program is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 1.0.1 of lat2cyr and earlier versions are vulnerable; other versions may also be affected.
18. Yazd Discussion Forum Insecure Default Permission Handling Vulnerabilities
BugTraq ID: 20889
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20889
Summary:
Yazd Discussion Forum is prone to multiple insecure-default-permission-handling vulnerabilities. User accounts are granted unintended permissions.
Exploiting these issues may allow a malicious user to create, modify, or read data in privileged areas of the application.
Versions prior to 3.0 are vulnerable.
19. MyBulletinBoard Generic_Error.PHP Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20079
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20079
Summary:
MyBulletinBoard is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue could allow an attacker to steal cookie-based authentication credentials and to launch other attacks.
Version 1.2 is vulnerable to this issue; other versions may also be affected.
20. PHPATM Multiple Remote File Include Vulnerabilities
BugTraq ID: 19765
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/19765
Summary:
phpATM is prone multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
21. SMF Multiple SQL Injection Vulnerabilities
BugTraq ID: 19814
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/19814
Summary:
SMF is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query.
A successful attack could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
Version 1.1 RC3 is vulnerable to this issue; other versions may also be affected.
22. Article System Volume.PHP Remote File Include Vulnerability
BugTraq ID: 20892
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20892
Summary:
Article System is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Article System version 0.6 is vulnerable; other versions may also be affected.
23. TWiki Viewfile Directory Traversal Vulnerability
BugTraq ID: 19907
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/19907
Summary:
Twiki is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.
Twiki versions 4.00 to 4.04 are vulnerable to this issue.
24. PADL Software Pam_Ldap PasswordPolicyResponse Authentication Bypass Vulnerability
BugTraq ID: 20880
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20880
Summary:
The pam_ldap module is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass authentication. This occurs in applications using pam_ldap authentication for locked-out accounts.
25. FreeWebShop Index.PHP Directory Traversal Vulnerability
BugTraq ID: 20888
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20888
Summary:
FreeWebShop is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow a remote attacker to access sensitive data that may aid in further attacks.
Version 2.2 is vulnerable; other versions may also be affected.
26. ImageMagick Sun Bitmap Image File Remote Unspecified Buffer Overflow Vulnerability
BugTraq ID: 19699
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/19699
Summary:
ImageMagick is prone to an unspecified remote buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
This issue allows attackers to execute arbitrary machine code in the context of applications that use the ImageMagick library.
This BID will be updated as further information is disclosed.
Versions of ImageMagick prior to 6.2.9-2 are vulnerable to this issue.
27. Webdrivers Simple Forum Message_details.PHP SQL Injection Vulnerability
BugTraq ID: 20937
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20937
Summary:
Webdrivers Simple Forum is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
28. Adobe Flash Player Multiple Remote Code Execution Vulnerabilities
BugTraq ID: 19980
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19980
Summary:
Adobe Flash Player is prone to multiple remote code-execution vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker could exploit this issue by creating a media file containing large, dynamically generated string data and submitting it to be processed by the media player.
These issues allow remote attackers to execute arbitrary machine code in the context of the user running the application. Other attacks are also possible.
Adobe Flash Player 8.0.24.0 and prior, Adobe Flash Professional 8, Flash Basic, Adobe Flash MX, and 2004Adobe Flex 1.5 are affected.
29. Macromedia Flash Malformed SWF File Multiple Vulnerabilities
BugTraq ID: 18894
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/18894
Summary:
The Macromedia Flash plug-in is prone to multiple remote vulnerabilities.
An attacker can exploit these vulnerabilities to execute arbitrary code or to crash the application hosting the Flash player (typically a web browser). Attackers exploit these issues through maliciously malformed SWF files that have been placed on a website or emailed to unsuspecting users.
Version 8.0.24.0 of Flash is vulnerable to these issues; other versions may also be affected.
30. LibRPM Query Report Arbitrary Code Execution Vulnerability
BugTraq ID: 20906
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20906
Summary:
The 'librpm' library is prone to an arbitrary code-execution vulnerability.
An attacker can exploit this issue to execute arbitrary machine code with the privileges of the currently logged-in user or to crash the affected application.
31. Microsoft Office Embedded Shockwave Flash Object Security Bypass Weakness
BugTraq ID: 18583
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/18583
Summary:
Microsoft Office is prone to a weakness that may allow remote attackers to execute arbitrary script code contained in Shockwave Flash Objects without first requiring confirmation from users.
A successful attack may allow attackers to access sensitive information and potentially execute malicious commands on a vulnerable computer.
The researcher responsible for discovering this issue has indicated that it presents itself on Windows 2003 SP1, Windows XP Professional Edition SP1 and SP2 running Microsoft Office 2003, and Windows 2000 Professional running Microsoft Office 2003. Other versions may be vulnerable as well.
32. America Online ICQ ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 20930
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20930
Summary:
The America Online ICQ ActiveX Control is prone to a remote code-execution vulnerability.
An attacker could exploit this issue simply by sending a message to a victim ICQ user.
Exploiting this issue could allow an attacker to execute arbitrary code.
The ICQPhone.SipxPhoneManager ActiveX control with a CLSID of 54BDE6EC-F42F-4500-AC46-905177444300 is affected.
33. PHP Multiple Input Validation Vulnerabilities
BugTraq ID: 19582
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19582
Summary:
PHP is prone to multiple input-validation vulnerabilities. Successful exploits could allow an attacker to write files in unauthorized locations, cause a denial-of-service condition, and potentially execute code.
These issues are reported to affect PHP versions 4.4.3 and 5.1.4; other versions may also be vulnerable.
34. PHP Group Exif Module Infinite Recursion Denial Of Service Vulnerability
BugTraq ID: 15358
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/15358
Summary:
PHP is prone to a denial-of-service vulnerability.
This issue occurs when parsing EXIF image data in corrupt JPEG files.
An attacker can exploit this vulnerability to crash the system, effectively denying service to legitimate users.
35. Ultimate PHP Board Header_simple.PHP Remote File Include Vulnerability
BugTraq ID: 20936
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20936
Summary:
Ultimate PHP Board is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Ultimate PHP Board 2.0 and prior versions are vulnerable to this issue.
36. PHP Multiple Unspecified Vulnerabilities
BugTraq ID: 17843
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/17843
Summary:
PHP is vulnerable to multiple unspecified vulnerabilities ranging from buffer-overflow to cross-site scripting issues.
The precise nature of these vulnerabilities is currently not known; this BID will be updated as more information becomes available.
Some of the issues discussed may be related to other BIDs regarding PHP vulnerabilities.
37. DeltaScripts PHP Classifieds Detail.PHP SQL Injection Vulnerability
BugTraq ID: 20935
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20935
Summary:
DeltaScripts PHP Classifieds is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
This issue affects 7.1 and prior versions; other versions may also be affected.
38. X.Org LibXfont CID Font File Multiple Integer Overflow Vulnerabilities
BugTraq ID: 19974
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19974
Summary:
The libXfont library is prone to multiple integer-overflow vulnerabilities.
Attackers can exploit this issue to execute arbitrary code with superuser privileges. A successful exploit will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service.
39. AIOCP Multiple Input Validation Vulnerabilities
BugTraq ID: 20931
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20931
Summary:
All In One Control Panel (AIOCP) is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, access or modify sensitive data, execute arbitrary script code in the context of the application, compromise the application and possibly exploit latent vulnerabilities in the underlying system; other attacks are also possible.
AIOCP 1.3.007 and prior versions are vulnerable.
40. Iodine DNS Response Stack Buffer Overflow Vulnerability
BugTraq ID: 20883
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20883
Summary:
IoDine is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.
Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected application. Failed attempts will likely crash the application, resulting in denial-of-service conditions.
IoDine version 0.3.2 is vulnerable.
41. MX Smartor Album Module Album.PHP Remote File Include Vulnerability
BugTraq ID: 20932
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20932
Summary:
MX Smartor Album module is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 1.02; other versions may also be affected.
42. Xoops NewList.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20927
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20927
Summary:
Xoops is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 1.0 is vulnerable; other versions may also be affected.
43. Article Script RSS.PHP SQL Injection Vulnerability
BugTraq ID: 20929
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20929
Summary:
Article Script is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Article Script 1.6.3 and prior versions are vulnerable to this issue.
44. @cid Stats Install.PHP3 Remote File Include Vulnerability
BugTraq ID: 20925
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20925
Summary:
The '@cid stats' program is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 2.3 is vulnerable to this issue.
45. Cyberfolio Multiple Remote File Include Vulnerabilities
BugTraq ID: 20928
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20928
Summary:
Cyberfolio is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Cyberfolio 2.0 RC1 and prior versions are affected by these issues.
46. EggBlog Multiple HTML Injection Vulnerabilities
BugTraq ID: 20924
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20924
Summary:
EggBlog is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
Exploiting these issues may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible.
These issues affect version 3.1.0; other versions may also be affected.
47. Microsoft XML Core Service XMLHTTP ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 20915
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20915
Summary:
Microsoft XML Core Service is prone to a remote code-execution vulnerability.
An attacker can exploit this issue to execute arbitrary code within the affected application, facilitating the remote compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.
48. OpenBSD ISAKMPD IPsec Replay Vulnerability
BugTraq ID: 19712
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19712
Summary:
OpenBSD's IPsec implementation is prone to remote replay attacks. This issue is due to the improper implementation of its replay window.
This issue allows remote attackers to replay IPsec traffic. The exact consequences of successful attacks depend on the nature of the traffic being replayed. This will likely affect only higher-level protocols such as UDP, since they don't provide their own anti-replay features.
49. SpearTek Search Module Cross-Site Scripting Vulnerability
BugTraq ID: 16018
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/16018
Summary:
SpearTek is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
This issue affects version 6.0; other versions may also be vulnerable.
50. SAP Web Application Server Remote Denial of Service Vulnerability
BugTraq ID: 20873
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20873
Summary:
SAP Web Application Server is prone to a remote denial-of-service vulnerability.
Exploiting this issue allows remote attackers to consume excessive system resources until the software becomes unresponsive to further calls, effectively denying service to legitimate users.
These versions are affected:
- 6.40 patch 135 and prior
- 7.00 patch 55 and prior.
51. SAP Web Application Server Remote Information Disclosure Vulnerability
BugTraq ID: 20877
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20877
Summary:
SAP Web Application Server is prone to a remote information-disclosure vulnerability.
An attacker can leverage this issue to gain access to sensitive data. Information obtained could aid in further attacks.
These versions are affected:
- 6.40 patch 135 and prior
- 7.00 patch 55 and prior.
52. Docmint Required.php Remote File Include Vulnerability
BugTraq ID: 20409
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20409
Summary:
Docmint is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects Docmint 2.0 and prior versions; other versions may also be affected.
53. FreeWebShop Index.PHP SQL Injection Vulnerability
BugTraq ID: 20887
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20887
Summary:
FreeWebShop is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
FreeWebShop 2.2 is vulnerable; prior versions may be affected as well.
54. Mozilla Multiple Products Remote Vulnerabilities
BugTraq ID: 19181
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19181
Summary:
The Mozilla Foundation has released thirteen security advisories specifying vulnerabilities in Mozilla Firefox, SeaMonkey, and Thunderbird.
These vulnerabilities allow attackers to:
- execute arbitrary machine code in the context of the vulnerable application
- crash affected applications
- run arbitrary script code with elevated privileges
- gain access to potentially sensitive information
- carry out cross-domain scripting attacks.
Other attacks may also be possible.
The issues described here will be split into individual BIDs as more information becomes available.
These issues are fixed in:
- Mozilla Firefox version 1.5.0.5
- Mozilla Thunderbird version 1.5.0.5
- Mozilla SeaMonkey version 1.0.3
55. OpenSSL PKCS Padding RSA Signature Forgery Vulnerability
BugTraq ID: 19849
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19849
Summary:
OpenSSL is prone to a vulnerability that may allow an attacker to forge an RSA signature. The attacker may be able to forge a PKCS #1 v1.5 signature when an RSA key with exponent 3 is used.
An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key.
All versions of OpenSSL prior to and including 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available.
56. OpenSolution Quick.Cms.Lite Local File Include Vulnerability
BugTraq ID: 20923
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20923
Summary:
Quick.Cms.Lite is prone to a remote file-include vulnerability.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
Quick.Cms.Lite 0.3 and prior versions are affected.
57. SazCart CART.PHP Remote File Include Vulnerability
BugTraq ID: 20922
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20922
Summary:
SazCart is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
SazCart 1.5 and prior versions are vulnerable to this issue.
58. Sun Solaris 10 UFS Local Denial of Service Vulnerability
BugTraq ID: 20919
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20919
Summary:
Sun Solaris 10 is prone to a local denial-of-service vulnerability. This issue affects the UFS filesystem-handling code.
An attacker can exploit this issue to crash the affected computer, denying service to legitimate users.
Solaris 10 on the ia32/x86 architecture has been reported vulnerable; previous versions may be affected as well, but Symantec has not confirmed this.
59. JaxUltraBB Delete.PHP HTML Injection Vulnerability
BugTraq ID: 20679
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20679
Summary:
JaxUltraBB is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
JaxUltraBB 2.0 and prior versions are vulnerable; other versions may also be affected.
60. GNU Mailman Multiple Security Vulnerabilities
BugTraq ID: 19831
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/19831
Summary:
Mailman is prone to multiple security vulnerabilities. The application fails to properly sanitize user-supplied input, and exhibits errors in MIME header handling and logging.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to cause a denial of service, and to inject spoofed log messages. This may help the attacker steal cookie-based authentication credentials, deny service to users, and launch other attacks.
These issues affect Mailman versions later than 2.0 and prior to 2.1.9rc1.
61. PHPDynaSite Multiple Remote File Include Vulnerabilities
BugTraq ID: 20921
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20921
Summary:
Multiple remote file-include vulnerabilities affect phpDynaSite because the application fails to sufficiently sanitize user-supplied input to affected scripts and parameters.
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
62. FreeBSD UFS Filesystem Local Integer Overflow Vulnerability
BugTraq ID: 20918
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20918
Summary:
FreeBSD is prone to a local integer-overflow vulnerability. This issue affects the UFS filesystem handling code.
An attacker can exploit this vulnerability to trigger a denial-of-service condition and possibly to execute arbitrary code with elevated privileges, but this has not been confirmed.
FreeBSD 6.1 is vulnerable to this issue.
63. Web Wiz Forum Search.ASP SQL Injection Vulnerability
BugTraq ID: 20778
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20778
Summary:
Web Wiz Forum is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
64. Easy Gallery Doc_Directory Parameter Multiple Remote File Include Vulnerabilities
BugTraq ID: 20411
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20411
Summary:
Easy Gallery is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Easy Gallery 1.4 and prior versions are affected by these issues.
65. Drake CMS XHTML.PHP Remote File Include Vulnerability
BugTraq ID: 20914
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20914
Summary:
Drake CMS is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Drake CMS 0.2.2.846 and prior versions are vulnerable to this issue.
66. e107 GSitemap.PHP Local File Include Vulnerability
BugTraq ID: 20913
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20913
Summary:
e107 is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
e107 0.7.5 and prior versions are vulnerable to this issue.
67. Retired: PHPWebSite PHPWS_SOURCE_DIR Parameter Multiple Remote File Include Vulnerabilities
BugTraq ID: 20412
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20412
Summary:
phpWebSite is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
phpWebSite version 0.10.2 is vulnerable to this issue; other versions may also be affected.
This BID is being retired. The 'PHPWS_SOURCE_DIR' is a constant and not an attacker-controlled variable.
68. MDPro PNSVLang Parameter Local File Include Vulnerability
BugTraq ID: 20912
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20912
Summary:
MDPro is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
MDPro 1.0.76 and prior versions are vulnerable to this issue.
69. Easy Doc Doc_Directory Parameter Multiple Remote File Include Vulnerabilities
BugTraq ID: 20407
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20407
Summary:
Easy Doc is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Easy Doc 1.4 and prior versions are affected by these issues.
70. PHPKit Popup.PHP SQL Injection Vulnerability
BugTraq ID: 20911
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20911
Summary:
PHPKIT is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
PHPKIT 1.6 RC2 and prior versions are vulnerable to this issue.
71. Freenews Moteur.PHP Remote File Include Vulnerability
BugTraq ID: 20405
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20405
Summary:
Freenews is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 1.1; other versions may also be affected.
72. PAFileDB ID Variable Cross-Site Scripting Vulnerability
BugTraq ID: 10229
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/10229
Summary:
A cross-site scripting vulnerability has been reported in paFileDB.
An attacker may construct a malicious link to this web application containing embedded arbitrary HTML and script code. If a vistim user follows the link, the attacker may be able to steal cookie-based authentication credentials or launch other attacks.
This issue is reported to reside in version 3.x; other versions may be affected as well.
73. HazirSite Giris_Yap.ASP SQL Injection Vulnerability
BugTraq ID: 20375
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20375
Summary:
HazirSite is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
74. IF-CMS Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20909
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20909
Summary:
IF-CMS is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
75. Sun Secure Global Desktop Unspecified Multiple Input Validation Vulnerabilities
BugTraq ID: 20135
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20135
Summary:
Sun Secure Global Desktop is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site or to retrieve sensitive system information. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
Sun Secure Global Desktop 4.2 and earlier versions are reported vulnerable.
76. PHP HTMLEntities HTMLSpecialChars Buffer Overflow Vulnerabilities
BugTraq ID: 20879
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20879
Summary:
PHP is prone to multiple buffer-overflow vulnerabilities because it fails to effectively bounds-check user-supplied input before copying it to an insufficiently sized buffer.
An attacker could exploit these issues to have arbitrary code execute in the context of an affected webserver. This may lead to the compromise of the webserver. Failed exploit attempts could cause denial-of-service conditions, denying access to legitimate users.
Only limited information is available regarding these issues. This BID will be updated as more information becomes available.
PHP 5 is vulnerable to these issues.
NOTE: The affected functions are employed by a large number of popular PHP libraries. As a result, there are many PHP applications affected by this issue.
77. IMlib2 Library Multiple Image Format Arbitrary Code Execution Vulnerabilities
BugTraq ID: 20903
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20903
Summary:
The imlib2 Library is prone to arbitrary code-execution vulnerabilities.
An attacker can exploit these issues to execute arbitrary machine code with the privileges of the currently logged in user.
78. Linux Kernel ISO9660 Denial of Service Vulnerability
BugTraq ID: 20920
Remote: No
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20920
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability. This issue affects the ISO9660 filesystem handling code.
An attacker can exploit this issue to crash the affected computer, denying service to legitimate users.
79. Xenis.creator CMS Multiple Input Validation Vulnerabilities
BugTraq ID: 20908
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20908
Summary:
Xenis.creator CMS is prone to multiple input-validation vulnerabilities, including multiple cross-site scripting and multiple SQL-injection issues, because the application fails to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
80. Linux Kernel Multiple IPV6 Packet Filtering Bypass Vulnerabilities
BugTraq ID: 20955
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20955
Summary:
The Linux kernel is prone to multiple IPv6 packet filtering bypass vulnerabilities because of insufficient handling of fragmented packets.
An attacker could exploit these issues to bypass ip6_table filtering rules. This could result in a false sense of security because filtering rules set up by system administrators can be bypassed in order to access services which are otherwise protected.
81. Kayako SupportSuite Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20954
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20954
Summary:
Kayako SupportSuite is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
SupportSuite version 3.00.32 is vulnerable to this issue; other versions may also be affected.
82. OWFS Owserver File Path Denial of Service Vulnerability
BugTraq ID: 20953
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20953
Summary:
OWFS Owserver is prone to a denial-of-service issue.
An attacker can exploit this issue to crash the affected server, denying service to legitimate users.
This issue affects version 2.5p5; other versions may also be affected.
83. IPManager Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20952
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20952
Summary:
IpManager is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
84. IPrimal Forums Index.PHP Authentication Bypass Vulnerability
BugTraq ID: 20951
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20951
Summary:
iPrimal Forums is prone to an authentication-bypass vulnerability because it fails to authenticate users before providing access to sensitive information.
This issue could allow an attacker to change the passwords of legitimate users to gain elevated privileges. A successful exploit could prevent legitimate users from accessing the application and may result in the compromise of the application.
85. GreenBeast CMS Up_Loader.PHP Arbitrary File Upload Vulnerability
BugTraq ID: 20950
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20950
Summary:
GreenBeast CMS is prone to an arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue could allow an attacker to upload and execute arbitrary script code in the context of the affected webserver process. This may facilitate the compromise of the application; other attacks are possible.
Versions 1.3 and prior are vulnerable to this issue.
86. Hyper NIKKI System Unspecified Cross-Site Scripting Vulnerability
BugTraq ID: 20949
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20949
Summary:
Hyper NIKKI System is prone to an unspecified cross-site scripting vulnerability.
This can be exploited to execute arbitrary HTML and script code in a userâ??s browser session in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attack.
The vulnerability is reported in version 2.19.8. Prior versions may also be affected.
87. iWare Professional Remote Code Execution Vulnerability
BugTraq ID: 20947
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20947
Summary:
iWare Professional CMS is prone to an arbitrary code execution vulnerability.
An attacker may leverage this issue to execute arbitrary PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
88. WarFTPD Multiple Format String Vulnerabilities
BugTraq ID: 20944
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20944
Summary:
WarFTPd is prone to multiple remote format-string vulnerabilities because the application fails to sanitize user-supplied input before passing it to a formatted-output function.
An attacker can exploit these issues to crash the server. It may be possible to execute arbitrary code within the context of the server; however this has not been confirmed.
WarFTPd 1.82.00-RC11 is reportedly vulnerable. Prior versions may be vulnerable as well.
89. WFTPD Server APPE Command Buffer Overflow Vulnerability
BugTraq ID: 20942
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20942
Summary:
WFTPD is prone to a buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before storing it in a finite-sized buffer.
An attacker can exploit this issue to execute arbitrary machine code in the context of the affected server application.
Version 3.23 is reportedly affected by this issue; other versions may also be affected.
90. Essentia Web Server GET And HEAD Requests Remote Buffer Overflow Vulnerability
BugTraq ID: 20910
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20910
Summary:
Essentia Web Server is prone to a stack-based buffer overflow vulnerability. This issue is occurs because the applications fails to bound-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to execute arbitrary code within the context of the webserver. Failed exploit attempts will result in a denial-of-service.
This issue affects version 2.15; other versions may also be affected.
This issue may be related to the issue described in BID 4159 (Essentia Web Server Long URL Buffer Overflow Vulnerability).
91. NewP News Publishing System Class.Database.PHP Remote File Include Vulnerability
BugTraq ID: 20893
Remote: Yes
Last Updated: 2006-11-07
Relevant URL: http://www.securityfocus.com/bid/20893
Summary:
NewP - News Publishing system is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
NewP version 1.0.0 is vulnerable; other versions may also be affected.
92. Admin.Tool CMS Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20905
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20905
Summary:
The admin.tool CMS package is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
Version 3 is vulnerable to this issue.
93. WebSpell Index.PHP SQL Injection Vulnerability
BugTraq ID: 20540
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20540
Summary:
webSPELL is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
94. Advanced GuestBook Admin.PHP Remote File Include Vulnerability
BugTraq ID: 20902
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20902
Summary:
Advanced GuestBook for phpBB is prone to a remote file-include vulnerability because the application fails to properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
Version 2.3.1 is vulnerable.
95. RETIRED: Ariadne CMS Multiple Remote File Include Vulnerabilities
BugTraq ID: 20916
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20916
Summary:
Multiple remote file include vulnerabilities affect Ariadne CMS. These issues are due to a failure of the application to sufficiently sanitize user-supplied input to affected scripts and parameters.
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
This BID has been retired; new information has been provided to disprove these vulnerabilities.
96. Simplog Multiple HTML Injection Vulnerabilities
BugTraq ID: 20901
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20901
Summary:
Simplog is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
Exploiting these issues may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible.
These issues affect version 0.9.3.
97. PhpBB XS Multiple Remote File Include Vulnerabilities
BugTraq ID: 20277
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20277
Summary:
phpBB XS is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
phpBB XS 0.58 and prior versions are affected by these issues.
98. Simplog Archive.PHP PID Parameter Cross-Site Scripting Vulnerability
BugTraq ID: 20900
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20900
Summary:
Simplog is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Simplog version 0.9.3 is vulnerable to this issue; other versions may also be affected.
99. E-Vision CMS Multiple Input Validation Vulnerabilities.
BugTraq ID: 20147
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20147
Summary:
E-Vision CMS is prone to multiple input-validation vulnerabilities because the application fails to sanitize user-supplied input. These include an arbitrary file-upload vulnerability and an SQL-injection vulnerability.
Exploiting these issues may allow an attacker to compromise the affected application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
100. PHPQuestionnaire Ifunction.PHP Remote File Include Vulnerability
BugTraq ID: 20142
Remote: Yes
Last Updated: 2006-11-06
Relevant URL: http://www.securityfocus.com/bid/20142
Summary:
phpQuestionnaire is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 3.12 is vulnerable to this issue; other versions may also be affected.
III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Attackers end-run around IE security
By: Robert Lemos
Microsoft shored up the security of its flagship browser with the latest release, but the software still lets through attacks on ActiveX flaws in other components of Windows.
http://www.securityfocus.com/news/11422
2. Quantum attacks worry computer scientists
By: Robert Lemos
Malicious software and viruses could inhabit the weird world of quantum computing, a fact that has convinced some researchers to study how to defend against non-classical attacks.
http://www.securityfocus.com/news/11421
3. Bot nets likely behind jump in spam
By: Robert Lemos
A significant rise in the global volume of spam in the past two months worries security analysts and suggests that bot-net-based bulk e-mail operations are rapidly becoming the norm.
http://www.securityfocus.com/news/11420
4. Researcher attempts to shed light on security troll
By: Robert Lemos
A security consultant claims to have identified a group of people that taunted researchers and hackers on the Full Disclosure mailing list, arguing that the group is linked to the retired hacker known as Gobbles.
http://www.securityfocus.com/news/11419
IV. SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Sales Representative, Alexandria
http://www.securityfocus.com/archive/77/450836
2. [SJ-JOB] Security Engineer, Alexandria
http://www.securityfocus.com/archive/77/450837
3. [SJ-JOB] Sr. Security Analyst, Alexandria
http://www.securityfocus.com/archive/77/450839
4. [SJ-JOB] Sales Engineer, Bay Area
http://www.securityfocus.com/archive/77/450838
5. [SJ-JOB] Senior Software Engineer, Austin
http://www.securityfocus.com/archive/77/450835
6. [SJ-JOB] Sr. Security Analyst, London
http://www.securityfocus.com/archive/77/450790
7. [SJ-JOB] Sr. Security Engineer, Cupertino
http://www.securityfocus.com/archive/77/450795
8. [SJ-JOB] Security Consultant, M4 Corridor
http://www.securityfocus.com/archive/77/450787
9. [SJ-JOB] Forensics Engineer, Richmond
http://www.securityfocus.com/archive/77/450788
10. [SJ-JOB] Sr. Security Analyst, London
http://www.securityfocus.com/archive/77/450789
11. [SJ-JOB] Quality Assurance, Redwood Shores
http://www.securityfocus.com/archive/77/450710
12. [SJ-JOB] Security Engineer, Bangalore
http://www.securityfocus.com/archive/77/450711
13. [SJ-JOB] Software Engineer, Redwood Shores
http://www.securityfocus.com/archive/77/450713
14. [SJ-JOB] Senior Software Engineer, Redwood Shores
http://www.securityfocus.com/archive/77/450714
15. [SJ-JOB] Customer Support, Redwood Shores
http://www.securityfocus.com/archive/77/450716
16. [SJ-JOB] Account Manager, London
http://www.securityfocus.com/archive/77/450669
17. [SJ-JOB] Management, San Jose
http://www.securityfocus.com/archive/77/450675
18. [SJ-JOB] Security Architect, Washington
http://www.securityfocus.com/archive/77/450667
19. [SJ-JOB] Application Security Architect, San Jose
http://www.securityfocus.com/archive/77/450668
20. [SJ-JOB] Technology Risk Consultant, San Jose
http://www.securityfocus.com/archive/77/450512
21. [SJ-JOB] Security Engineer, New YOrk
http://www.securityfocus.com/archive/77/450510
22. [SJ-JOB] Technology Risk Consultant, San Francisco
http://www.securityfocus.com/archive/77/450511
23. [SJ-JOB] Security Engineer, New York
http://www.securityfocus.com/archive/77/450514
24. [SJ-JOB] Application Security Architect, Washington
http://www.securityfocus.com/archive/77/450515
25. [SJ-JOB] Security Researcher, San Diego
http://www.securityfocus.com/archive/77/450473
26. [SJ-JOB] Technical Support Engineer, Napa
http://www.securityfocus.com/archive/77/450469
27. [SJ-JOB] Security Product Marketing Manager, San Diego
http://www.securityfocus.com/archive/77/450471
28. [SJ-JOB] Security Product Manager, San Diego
http://www.securityfocus.com/archive/77/450472
29. [SJ-JOB] Sr. Product Manager, San Diego
http://www.securityfocus.com/archive/77/450474
30. [SJ-JOB] Sales Engineer, Superior
http://www.securityfocus.com/archive/77/450459
31. [SJ-JOB] Security System Administrator, New York
http://www.securityfocus.com/archive/77/450461
32. [SJ-JOB] Sr. Security Engineer, Herndon
http://www.securityfocus.com/archive/77/450462
33. [SJ-JOB] Security Researcher, Silicon Valley
http://www.securityfocus.com/archive/77/450463
34. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/450460
35. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/450378
36. [SJ-JOB] Sales Engineer, Boston
http://www.securityfocus.com/archive/77/450384
37. [SJ-JOB] Sales Engineer, Chicago
http://www.securityfocus.com/archive/77/450395
38. [SJ-JOB] Sales Engineer, Chicago
http://www.securityfocus.com/archive/77/450383
39. [SJ-JOB] Sales Engineer, Seattle
http://www.securityfocus.com/archive/77/450388
40. [SJ-JOB] Sales Engineer, Washington
http://www.securityfocus.com/archive/77/450377
41. [SJ-JOB] Sales Representative, Napa
http://www.securityfocus.com/archive/77/450380
42. [SJ-JOB] Sales Engineer, Vacaville
http://www.securityfocus.com/archive/77/450375
43. [SJ-JOB] Forensics Engineer, Denver
http://www.securityfocus.com/archive/77/450376
44. [SJ-JOB] Security Engineer, Denver
http://www.securityfocus.com/archive/77/450319
45. [SJ-JOB] Incident Handler, New York
http://www.securityfocus.com/archive/77/450323
46. [SJ-JOB] Information Assurance Engineer, Denver
http://www.securityfocus.com/archive/77/450324
47. [SJ-JOB] Jr. Security Analyst, Denver
http://www.securityfocus.com/archive/77/450330
48. [SJ-JOB] Security Product Manager, Denver
http://www.securityfocus.com/archive/77/450335
49. [SJ-JOB] Security Architect, Denver
http://www.securityfocus.com/archive/77/450318
50. [SJ-JOB] Auditor, Denver
http://www.securityfocus.com/archive/77/450322
51. [SJ-JOB] Chief Security Strategist, Denver
http://www.securityfocus.com/archive/77/450326
52. [SJ-JOB] Incident Handler, D.C. Metro area
http://www.securityfocus.com/archive/77/450328
53. [SJ-JOB] Sales Representative, Singapore
http://www.securityfocus.com/archive/77/450334
54. [SJ-JOB] Security Engineer, London
http://www.securityfocus.com/archive/77/450266
55. [SJ-JOB] Auditor, Miami
http://www.securityfocus.com/archive/77/450260
56. [SJ-JOB] Sales Engineer, Washington
http://www.securityfocus.com/archive/77/450263
57. [SJ-JOB] Auditor, Washington, DC
http://www.securityfocus.com/archive/77/450264
58. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/450265
59. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/450291
60. [SJ-JOB] Product Strategist, Newark
http://www.securityfocus.com/archive/77/450255
61. [SJ-JOB] Manager, Information Security, New York
http://www.securityfocus.com/archive/77/450257
62. [SJ-JOB] Auditor, Boston
http://www.securityfocus.com/archive/77/450259
63. [SJ-JOB] Sales Engineer, Hoboken
http://www.securityfocus.com/archive/77/450262
64. [SJ-JOB] Sr. Security Analyst, Richmond
http://www.securityfocus.com/archive/77/450254
V. INCIDENTS LIST SUMMARY
---------------------------
VI. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. SinFP 2.04 release, works under Windows
http://www.securityfocus.com/archive/82/450615
2. EUSecWest/London CFP extended to Nov. 7
http://www.securityfocus.com/archive/82/450436
3. IE7 SELECT Tag
http://www.securityfocus.com/archive/82/450343
VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #315
http://www.securityfocus.com/archive/88/450198
2. IIS Security
http://www.securityfocus.com/archive/88/449921
VIII. SUN FOCUS LIST SUMMARY
----------------------------
1. Solaris 10 necessary file question
http://www.securityfocus.com/archive/92/450456
IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. Vulnerability Assessment of a EAL 4 system
http://www.securityfocus.com/archive/91/450261
X. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to sf-news-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.
If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.
XI. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: Watchfire
As web applications become increasingly complex, tremendous amounts of sensitive data - including personal, medical and financial information - are exchanged, and stored. This paper examines a few vulnerability detection methods - specifically comparing and contrasting manual penetration testing with automated scanning tools. Download Watchfire's "Web Application Security: Automated Scanning or Manual Penetration Testing?" whitepaper today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008YSk
No comments:
Post a Comment