http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html
http://www.adaptivecomputing.com/security-advisory/
http://www.securityfocus.com/archive/1/533576/100/0/threaded
http://www.securityfocus.com/bid/70174
https://exchange.xforce.ibmcloud.com/vulnerabilities/96698
|