Attackers can exploit these issues to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
An attacker can exploit these issues by enticing an unsuspecting victim to follow a malicious URI.
The following exploit codes are available:
http://downloads.securityfocus.com/vulnerabilities/exploits/56844.html.txt