Full Disclosure mailing list archives

Microsoft .NET request filtering bypass vulnerability (BID 20753)


From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 05 Apr 2007 16:57:50 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

FYI,

The technical details for the Microsoft .NET request filtering bypass
vulnerability (BID 20753) can be found on the following URL:

http://www.procheckup.com/Vulner_PR0703.php
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGFRx+UmN3xwbmU6YRAmvGAKC6HYWmgsIt/SXIIR9gPvVFzIMy8QCgtFXs
JkcdoHWDTLEaNg/tql7w5nA=
=toNB
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: