Page 13 of 66 results (0.009 seconds)

CVSS: 2.6EPSS: 5%CPEs: 9EXPL: 0

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory. • http://securityreason.com/securityalert/817 http://securitytracker.com/id?1015996 http://www.osvdb.org/25084 http://www.securityfocus.com/archive/1/431987/100/0/threaded http://www.securityfocus.com/archive/1/431993/100/0/threaded http://www.securityfocus.com/archive/1/431994/100/0/threaded http://www.vupen.com/english/advisories/2006/1541 https://exchange.xforce.ibmcloud.com/vulnerabilities/26034 https://usn.ubuntu.com/279-1 • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Nessus 2.0.10a stores account passwords in plaintext in .nessusrc files, which allows local users to obtain passwords. NOTE: the original researcher reports that the vendor has disputed this issue • http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1363.html http://securitytracker.com/id?1009575 http://www.osvdb.org/4816 https://exchange.xforce.ibmcloud.com/vulnerabilities/15644 • CWE-255: Credentials Management Errors •

CVSS: 3.7EPSS: 0%CPEs: 13EXPL: 0

A race condition in nessus-adduser in Nessus 2.0.11 and possibly earlier versions, if the TMPDIR environment variable is not set, allows local users to gain privileges. • http://secunia.com/advisories/12127 http://www.gentoo.org/security/en/glsa/glsa-200408-11.xml http://www.nessus.org/nessus_2_0.html http://www.securityfocus.com/bid/10784 https://exchange.xforce.ibmcloud.com/vulnerabilities/16768 •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in libnasl in Nessus before 2.0.6 allow local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code via (1) a long proto argument to the scanner_add_port function, (2) a long user argument to the ftp_log_in function, (3) a long pass argument to the ftp_log_in function. Múltiples desbordamientos de búfer en Nessus anterior a la 2.0.6 permiten que usuarios locales con privilegios de carga de plugin provoquen una denegación de servicio (core dump) y posiblemente ejecuten código arbitrario mediante (1) un argumento proto demasiado largo en la funcion scanner_add_port, (2) un argumento user en la función ftp_log_in, (3) un argumento pass demasiado largo en la función ft_log_in. • http://marc.info/?l=bugtraq&m=105364059803427&w=2 http://marc.info/?l=bugtraq&m=105369506714849&w=2 http://www.securityfocus.com/bid/7664 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Multiple unknown vulnerabilities in Nessus before 2.0.6, in libnessus and possibly libnasl, a different set of vulnerabilities than those identified by CVE-2003-0372 and CVE-2003-0373, aka "similar issues in other nasl functions as well as in libnessus." Múltiples vulnerabilidades desconocidas en Nessus anterior a la 2.0.6, en libnessus y posiblemente libnsl (un conjunto diferente de las señaladas en CAN-2003-0372 y CAN-2003-0373). • http://marc.info/?l=bugtraq&m=105364059803427&w=2 http://www.securityfocus.com/bid/7664 •