To verify it is a real vuln, it can be done with copy-paste the url. However, it could be the result of a POST form.
Articles in this section
- Are there impact to devices when scanning?
- How long does it take to scan and IP? In general?
- How can I change reporting language
- Can I customize reporting in the Penetrator?
- Do the Penetrator check for SSL vulnerabilities?
- Penetrator OVA network Promiscuous mode
- Scanning the same target, we get 2 different results
- I am getting a False Positive Scan
- How to do Delta Report of my scans
- Question about creating users
Comments
0 comments
Please sign in to leave a comment.