Raptor Firewall HTTP Request Proxying Vulnerability

Attacker configures browser to use IP address of Raptor firewall as HTTP Proxy, then begins probing internal network.


 

Privacy Statement
Copyright 2010, SecurityFocus