info
discussion
exploit
solution
references
Megalith Authentication Security Bypass Vulnerability
Attackers can use a Web browser or readily available tools to exploit this issue.
Privacy Statement
Copyright 2010, SecurityFocus