[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Microsoft .NET request filtering bypass vulnerability (BID 20753)
- To: full-disclosure@xxxxxxxxxxxxxxxxx, webappsec@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Microsoft .NET request filtering bypass vulnerability (BID 20753)
- From: Adrian Pastor <adrian.pastor@xxxxxxxxxxxxxx>
- Date: Thu, 05 Apr 2007 16:57:50 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
FYI,
The technical details for the Microsoft .NET request filtering bypass
vulnerability (BID 20753) can be found on the following URL:
http://www.procheckup.com/Vulner_PR0703.php
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFGFRx+UmN3xwbmU6YRAmvGAKC6HYWmgsIt/SXIIR9gPvVFzIMy8QCgtFXs
JkcdoHWDTLEaNg/tql7w5nA=
=toNB
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/