Cacti Multiple Input Validation Vulnerabilities

Attackers may exploit these issues through a browser.

To exploit the cross-site scripting and HTTP response-splitting issues, an attacker must entice an unsuspecting victim into visiting a malicious URI.

The following proof-of-concept URIs are available:


 

Privacy Statement
Copyright 2010, SecurityFocus