Hi, an attacker can read the rules file and use any directory or file is not monitored to carry out the attack.
Em 22-03-2012 18:04, Castle, Shane escreveu: > Just what is this vulnerability, specifically? > -- Att, *Michel Henrique Aquino Santos* Bacharelado em Ciência da Computação Universidade Federal de Lavras - UFLA Skype: michel_has Gtalk: michel.has michel....@gmail.com Linux User # 496756 http://resolvidoslinux.blogspot.com/