HP Tru64 Valid User Enumeration Weakness

An attacker can use readily available network tools to exploit this weakness.

The following exploit is available:


 

Privacy Statement
Copyright 2010, SecurityFocus