BSR Webweaver 1.33 Author : Usman Saeed , Exploit @ Xc0re Security Research Group. [*] Date: 15/09/09 [*] http://www.brswebweaver.com/downloads.html [*] Attack type : Remote [*] Patch Status : Unpatched [*] Description : In ISAPI/CGI path is [%installdirectory%/scripts] and through HTTP the alias is [http://[host]/scripts] ,The access security check is that…
As we do not use ads of any sort, thus if you like this website and want it to continue running, then please donate. 🙂 Thank you.
Bitcoin (BTC): 3J6Z7V7kSP3Fx61PTcBfertnS1WoKvMxnk
Ethereum (ETH): 0x7CAd502Fc37f9c447EebA70ab28C611a16c65778
Hello dear visitor, your IP Details:22.214.171.124, United States,
Follow me on TwitterMy Tweets
.NET 0day 67 algorithms Anonymity anonymous Antispyware Antivirus Appsec art Avast black hat SEO BSR-webweaver bug in google+ bypass Bypass WAF Cherokee Web Server China Cisco cracker Critical infrastructures cross site scripting cyber cyber armies cyber army Cyber attacks cyber deception cyber war cyber weapon deception Exploit Facebook firewall bypass Hackers hacking Injection MVC perl exploit code privacy Security social network Tor usman saeed vulnerability XSS