Internet Junkbuster Proxy...

- AV AC AU C I A
发布: 2002-12-23
修订: 2025-04-13

A vulnerability in Junkbuster may allow remote attackers to abuse the proxy to make unauthorized connections to arbitrary ports on any hosts that the proxy may access. It is possible to exploit this issue using the CONNECT method to proxy an unauthorized connection to an arbitrary port on any host the proxy may access.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息