This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
A web application hosted on the remote web server has a cross-site
The version of WebShield UI hosted on the remote web server has a
reflected cross-site scripting vulnerability. Input to the 'bodyStyle'
parameter of ProcessTextFiles is not properly sanitized.
A remote attacker could exploit this by tricking a user into requesting
a maliciously crafted URL, resulting in arbitrary script code execution.
This application has several other vulnerabilities, though Nessus has
not checked for those issues.
See also :
Apply the relevant patch specified in the McAfee advisory.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false