Seba, On Fri, Jul 10, 2009 at 10:12 PM, Seba ahaa<[email protected]> wrote: > > > Hi Andrés > > hi everyone > > > > Using w3af_1.0-rc2 Setup, I found a vulnerability > > > > A possible (most probably a false positive than a bug) buffer overflow was > found > > when requesting: http://www.example.com/ . Using method: POST > > > > > > The URL: http://www.example.com has a ptah disclosure vulnerability wich > discloses: "/home/Home". This vulnerability was found in the request with id > 2 > >
Most probably a false positive, > > > There is plugins in w3af to exploit this vulnerability? > No, no exploits for buffer overflows. > > how to configure plugins exploit? > > > > Greetings > > Seba... > > > > > > > > > ________________________________ > Diferentes formas de estar en contacto con amigos y familiares. Descúbrelas. > Descúbrelas. > > ------------------------------------------------------------------------------ > Enter the BlackBerry Developer Challenge > This is your chance to win up to $100,000 in prizes! For a limited time, > vendors submitting new applications to BlackBerry App World(TM) will have > the opportunity to enter the BlackBerry Developer Challenge. See full prize > details at: http://p.sf.net/sfu/Challenge > _______________________________________________ > W3af-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/w3af-users > > -- Andrés Riancho Founder, Bonsai - Information Security http://www.bonsai-sec.com/ http://w3af.sf.net/ ------------------------------------------------------------------------------ Enter the BlackBerry Developer Challenge This is your chance to win up to $100,000 in prizes! For a limited time, vendors submitting new applications to BlackBerry App World(TM) will have the opportunity to enter the BlackBerry Developer Challenge. See full prize details at: http://p.sf.net/sfu/Challenge _______________________________________________ W3af-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/w3af-users
