Loading ...
Global Do...
News & Politics
31
0
Try Now
Log In
Pricing
1 Attackers can use readily available tools to exploit this issue. 2 3 The following example POST data is available: 4 5 POST /j_security_check HTTP/1.1 6 Host: www.example.com 7 8 j_username=tomcat&j_password=% Page 1/1 Apache Tomcat Form Authentication Username Enumeration Weakness D. Matscheko 11/09/2009