Parallels Drag and Drop Hidden Share Vulnerability

An attacker can exploit these issues by gaining local interactive access to the affected computer.

The following proof of concept demonstrates this issue.


 

Privacy Statement
Copyright 2010, SecurityFocus