Hi Andrés
hi everyone
 
Using w3af_1.0-rc2 Setup, I found a vulnerability
 
A possible (most probably a false positive than a bug) buffer overflow was found
 when requesting: http://www.example.com/ . Using method: POST
 
 
The URL: http://www.example.com has a ptah disclosure vulnerability wich 
discloses: "/home/Home". This vulnerability was found in the request with id 2

 
 
There is plugins in w3af to exploit this vulnerability?
 
how to configure plugins exploit?

 
Greetings
Seba...
 

 

 

 



_________________________________________________________________
Descubre todas las formas en que puedes estar en contacto con amigos y 
familiares.
http://www.microsoft.com/windows/windowslive/default.aspx
------------------------------------------------------------------------------
Enter the BlackBerry Developer Challenge  
This is your chance to win up to $100,000 in prizes! For a limited time, 
vendors submitting new applications to BlackBerry App World(TM) will have
the opportunity to enter the BlackBerry Developer Challenge. See full prize  
details at: http://p.sf.net/sfu/Challenge
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to