WebApp Sec mailing list archives

Microsoft .NET request filtering bypass vulnerability (BID 20753)


From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 05 Apr 2007 16:57:50 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

FYI,

The technical details for the Microsoft .NET request filtering bypass
vulnerability (BID 20753) can be found on the following URL:

http://www.procheckup.com/Vulner_PR0703.php
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGFRx+UmN3xwbmU6YRAmvGAKC6HYWmgsIt/SXIIR9gPvVFzIMy8QCgtFXs
JkcdoHWDTLEaNg/tql7w5nA=
=toNB
-----END PGP SIGNATURE-----

-------------------------------------------------------------------------
Sponsored by: Watchfire

It's been reported that 75% of websites are vulnerable to attack. That's 
because hackers know to exploit weaknesses in web applications. 
Traditional approaches to securing these assets no longer apply. Download 
the "Addressing Challenges in Application Security" whitepaper today, 
and see for yourself.

https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008fHF
--------------------------------------------------------------------------


Current thread: