Ditto Forensic FieldStation Multiple Security Vulnerabilities

An attacker can use a web browser to exploit some of these issues.

To exploit cross-site request forgery vulnerability, an attacker must entice an unsuspecting user to follow a malicious URI.

An attacker can use readily available tools to exploit the authentication bypass issue.


 

Privacy Statement
Copyright 2010, SecurityFocus