Full Disclosure mailing list archives
Microsoft .NET request filtering bypass vulnerability (BID 20753)
From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 05 Apr 2007 16:57:50 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FYI, The technical details for the Microsoft .NET request filtering bypass vulnerability (BID 20753) can be found on the following URL: http://www.procheckup.com/Vulner_PR0703.php -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGFRx+UmN3xwbmU6YRAmvGAKC6HYWmgsIt/SXIIR9gPvVFzIMy8QCgtFXs JkcdoHWDTLEaNg/tql7w5nA= =toNB -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Microsoft .NET request filtering bypass vulnerability (BID 20753) Adrian Pastor (Apr 05)