Seba,

On Fri, Jul 10, 2009 at 10:12 PM, Seba ahaa<[email protected]> wrote:
>
>
> Hi Andrés
>
> hi everyone
>
>
>
> Using w3af_1.0-rc2 Setup, I found a vulnerability
>
>
>
> A possible (most probably a false positive than a bug) buffer overflow was
> found
>
>  when requesting: http://www.example.com/ . Using method: POST
>
>
>
>
>
> The URL: http://www.example.com has a ptah disclosure vulnerability wich
> discloses: "/home/Home". This vulnerability was found in the request with id
> 2
>
>

Most probably a false positive,

>
>
> There is plugins in w3af to exploit this vulnerability?
>

No, no exploits for buffer overflows.

>
> how to configure plugins exploit?
>
>
>
> Greetings
>
> Seba...
>
>
>
>
>
>
>
>
> ________________________________
> Diferentes formas de estar en contacto con amigos y familiares. Descúbrelas.
> Descúbrelas.
>
> ------------------------------------------------------------------------------
> Enter the BlackBerry Developer Challenge
> This is your chance to win up to $100,000 in prizes! For a limited time,
> vendors submitting new applications to BlackBerry App World(TM) will have
> the opportunity to enter the BlackBerry Developer Challenge. See full prize
> details at: http://p.sf.net/sfu/Challenge
> _______________________________________________
> W3af-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/w3af-users
>
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
Enter the BlackBerry Developer Challenge  
This is your chance to win up to $100,000 in prizes! For a limited time, 
vendors submitting new applications to BlackBerry App World(TM) will have
the opportunity to enter the BlackBerry Developer Challenge. See full prize  
details at: http://p.sf.net/sfu/Challenge
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to