On 07/23/07 09:54, [EMAIL PROTECTED] wrote:

> Plug in 11773 appearts to be performing a http get looking for
> "/Gozila.cgi"
...
> So I know that Gozila.cgi file does not exist. So I'm not sure what
> is causing the plug in to trigger and create the fails postive.

The exploit supposedly causes the remote router to crash, and the plugin 
was apparently not able to get a response out of the target after 
sending it.

I've just committed a change to disable the plugin, though, since 
obviously this was a false-positive.

Thanks John,


George
-- 
[EMAIL PROTECTED]
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to