Computer Security
[EN] securityvulns.ru no-pyccku


OpenVPN Access Server CSRF
Published:21.07.2014
Source:
SecurityVulns ID:13875
Type:client
Threat Level:
5/10
Description:XML-RPC interface CSRF.
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20140716-1 :: Remote Code Execution via CSRF in OpenVPN Access Server "Desktop Client" (21.07.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod