Domain Technologie Control Multiple Vulnerabilities

An attacker can use readily available tools to exploit these issues. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.


 

Privacy Statement
Copyright 2010, SecurityFocus