Excuse my ignorance but I got a high vulnerability for
the subject plugin with the following explanation:

The following requests seem to allow the reading of
sensitive files or XSS.  You should manually try them
to see if anything bad happens:
/library/libfileshtm.asp?show=Y&file=xxx.htm?show=<script>alert('foo')</script>

Is nessus telling me to type the above command
directly into the URL to test this vuln or do I need
to fill in parameters for <script>?

TIA

__________________________________________________
Do you Yahoo!?
New DSL Internet Access from SBC & Yahoo!
http://sbc.yahoo.com
-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.

Reply via email to