Multiple Vendor Multiple HTTP Request Smuggling Vulnerabilities

No exploit is required. Proofs of concept are available in the referenced Watchfire paper 'HTTP Request Smuggling'.


 

Privacy Statement
Copyright 2010, SecurityFocus