Hi Andrés
hi everyone
Using w3af_1.0-rc2 Setup, I found a vulnerability
A possible (most probably a false positive than a bug) buffer overflow was found
when requesting: http://www.example.com/ . Using method: POST
The URL: http://www.example.com has a ptah disclosure vulnerability wich
discloses: "/home/Home". This vulnerability was found in the request with id 2
There is plugins in w3af to exploit this vulnerability?
how to configure plugins exploit?
Greetings
Seba...
_________________________________________________________________
Descubre todas las formas en que puedes estar en contacto con amigos y
familiares.
http://www.microsoft.com/windows/windowslive/default.aspx
------------------------------------------------------------------------------
Enter the BlackBerry Developer Challenge
This is your chance to win up to $100,000 in prizes! For a limited time,
vendors submitting new applications to BlackBerry App World(TM) will have
the opportunity to enter the BlackBerry Developer Challenge. See full prize
details at: http://p.sf.net/sfu/Challenge
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users