
Google Search Dork: "I have been invoked by servletToJSP"
# Exploit Title: i have been invoked by servletToJSP # Google Dork: i have been invoked by servletToJSP # Date: January 12, 2019 # Exploit Author: g.go # Vender Homepage: g.goog.gogooggo@gmail.com # Software Link: tomcat.apache.org # Version: 7-9 # Description: find many improperly set up tomacat servlets #### Google Dork i have been invoked by servletToJSP
"I have been invoked by servletToJSP" Google Dork Source : "I have been invoked by servletToJSP"