This vulnerability could enable an attacker to spoof trusted Internet content. Users could believe they are accessing trusted Internet content when in reality they are accessing malicious Internet content, for example a malicious Web site. However, an attacker would first have to persuade a user to visit the attacker's site to attempt to exploit this vulnerability.
Download: Security Update for Proxy Server 2.0
-1 Comments - Add comment