Pivot Multiple Input Validation Vulnerabilities

Attackers can exploit these issues through a web client.

The following proof of concept is available:


 

Privacy Statement
Copyright 2010, SecurityFocus