Hi,
an attacker can read the rules file and use any directory or file is not
monitored to carry out the attack.

Em 22-03-2012 18:04, Castle, Shane escreveu:
> Just what is this vulnerability, specifically?
>

-- 
Att,

*Michel Henrique Aquino Santos*
Bacharelado em Ciência da Computação
Universidade Federal de Lavras - UFLA
Skype: michel_has
Gtalk: michel.has
michel....@gmail.com

Linux User # 496756

http://resolvidoslinux.blogspot.com/

Reply via email to