I'm looking at script ID 101008, XRMS_CVE-2008-3664.nasl,
https://wald.intevation.org/scm/viewvco.php/scripts/2009/XRMS_CVE-2008-3664.nasl?revision=15&root=openvas-nvts&view=markup
This is the code I think is wrong:
function xssExploit(install_path)
{
[...]
req = http_get(port:port, item:string(path, php));
There is no variable named "path" defined in the script and the function
argument install_path is not used.
(Is there a better place to report this sort of bug than the mailing list?)
Harry.
_______________________________________________
Openvas-plugins mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins