Monster Top List Remote Command Execution Vulnerability

Attackers can exploit this issue via a browser.

The following proof-of-concept demonstrates this issue.


 

Privacy Statement
Copyright 2010, SecurityFocus