Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So in other words, this is something that someone has to run on the computer, then it injects itself into IIS. Not a remote vulnerability, just an entry point for monitoring HTTP requests once you have code execution in there.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: