ZeroCold Posted April 30, 2011 Report Posted April 30, 2011 Source Code Disclosure over HTTPExploiting the Download PageTABLE OF CONTENTS • Abstract ............................................................... 3 • Introduction ......................................................... 3 • A Likely Scenario................................................... 3 • The Exploit ........................................................... 6 • The Impact........................................................... 9 • Recommended Resolutions ................................. 10 • About The Author ................................................ 10 • About SecurEyes ................................................. 10http://www.secureyes.net/downloads/Source_Code_Disclosure_over_HTTP.pdf Quote