Phong,

On Sun, Aug 29, 2010 at 10:05 AM, phong vuong <[email protected]> wrote:
> after scanning i got 5 vulns of "eval() input injection vulns" however when
> i exploit, i don't get the remove shell
> anyone know why ?( my firewall turned off, if you ask)

    Interesting... could you please send us the request(s) associated
with the vulnerability? (you can get those by scanning the web
application, clicking over the vuln and looking below the
vulnerability description). Please obfuscate the real name of the
domain you're scanning.

Regards,

> thanks
>
> ------------------------------------------------------------------------------
> Sell apps to millions through the Intel(R) Atom(Tm) Developer Program
> Be part of this innovative community and reach millions of netbook users
> worldwide. Take advantage of special opportunities to increase revenue and
> speed time-to-market. Join now, and jumpstart your future.
> http://p.sf.net/sfu/intel-atom-d2d
> _______________________________________________
> W3af-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/w3af-users
>
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
This SF.net Dev2Dev email is sponsored by:

Show off your parallel programming skills.
Enter the Intel(R) Threading Challenge 2010.
http://p.sf.net/sfu/intel-thread-sfd
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to