*** Juan José Pavlik Salles wrote:
> Then it's a false positive,
The code doesn't look like it's prone to FPs.
-----
if (
ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:buf) &&
egrep(pattern:"<script>alert\(document\.cookie\);</script>", string: buf)
) {
security_hole(port:port);
-----
> how can i report it to be checked??
You already did. I can't see any problems in the NVT.
Micha
--
Michael Meyer OpenPGP Key: 52A6EFA6
http://www.greenbone.net/
Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss