Oh my god, my bad. I ran the test, to a different vm, i'm so sorry guys.
Won't happen again, thanks!

2012/8/8 Michael Meyer <[email protected]>

> *** Juan José Pavlik Salles wrote:
>
> > Then it's a false positive,
>
> The code doesn't look like it's prone to FPs.
>
> -----
> if (
>     ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:buf) &&
>     egrep(pattern:"<script>alert\(document\.cookie\);</script>", string:
> buf)
>   ) {
>        security_hole(port:port);
> -----
>
> > how can i report it to be checked??
>
> You already did. I can't see any problems in the NVT.
>
> Micha
>
> --
> Michael Meyer                            OpenPGP Key: 52A6EFA6
> http://www.greenbone.net/
> Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
> Osnabrück, HR B 202460
> Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>



-- 
Pavlik Juan José
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to