I get in my report a High port vulnerability: 443/tcp HTTP 1.0 header overflow.
I am trying to manually reproduce this for the dev side to have a look. The problem is that the web server is not crashing when I manually run the nasl. Maybe I do something worng when running hth test? Or does OpenVAS do anything else that only running the depedencies and the test itself?
I run the test like this:
openvas-nasl -X -B -d -T log.txt -i /usr/local/var/lib/openvas/plugins/ -t 220.127.116.11 find_service.nasl httpver.nasl global_settings.nasl www_too_long_header10.nasl --kb=“Ports/tcp/443=1”