On 07/23/07 09:54, [EMAIL PROTECTED] wrote: > Plug in 11773 appearts to be performing a http get looking for > "/Gozila.cgi" ... > So I know that Gozila.cgi file does not exist. So I'm not sure what > is causing the plug in to trigger and create the fails postive.
The exploit supposedly causes the remote router to crash, and the plugin was apparently not able to get a response out of the target after sending it. I've just committed a change to disable the plugin, though, since obviously this was a false-positive. Thanks John, George -- [EMAIL PROTECTED] _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
