Oh my god, my bad. I ran the test, to a different vm, i'm so sorry guys. Won't happen again, thanks!
2012/8/8 Michael Meyer <[email protected]> > *** Juan José Pavlik Salles wrote: > > > Then it's a false positive, > > The code doesn't look like it's prone to FPs. > > ----- > if ( > ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:buf) && > egrep(pattern:"<script>alert\(document\.cookie\);</script>", string: > buf) > ) { > security_hole(port:port); > ----- > > > how can i report it to be checked?? > > You already did. I can't see any problems in the NVT. > > Micha > > -- > Michael Meyer OpenPGP Key: 52A6EFA6 > http://www.greenbone.net/ > Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG > Osnabrück, HR B 202460 > Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner > _______________________________________________ > Openvas-discuss mailing list > [email protected] > http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss > -- Pavlik Juan José
_______________________________________________ Openvas-discuss mailing list [email protected] http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
