Hadn't seen this on the lists yet: Cannonicalization issue in ASP.NET <snip> Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials. This reported vulnerability exists in ASP.NET and does not affect ASP. </snip> http://www.microsoft.com/security/incident/aspnet.mspx Their interim "fix" is to add an event handler to force real path validation for all requests: http://support.microsoft.com/?kbid=887459 Which is certainly not a bad idea but methinks another performance/security tradeoff at hand. Thanks for the heads-up Daniel... Arian Evans Sr. Security Engineer FishNet Security KC Office: 816.421.6611 Direct: 816.701.2045 Toll Free: 888.732.9406 Fax: 816.474.0394 http://www.fishnetsecurity.com The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.