info
discussion
exploit
solution
references
Pivot Multiple Input Validation Vulnerabilities
Attackers can exploit these issues through a web client.
The following proof of concept is available:
/data/vulnerabilities/exploits/PivotMultipleInputJuly072006.html
Privacy Statement
Copyright 2010, SecurityFocus