13 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

09 Aug 2010 — nessusd_www_server.nbin in the Nessus Web Server plugin 1.2.4 for Nessus allows remote attackers to obtain sensitive information via a request to the /feed method, which reveals the version in a response. nessusd_www_server.nbin en el plugin Nessus Web Server v1.2.4 para Nessus permite a atacantes remotos obtener información sensible a través de una petición al método /feed, que revela la versión en una respuesta. • http://www.securityfocus.com/archive/1/512645/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

30 Jul 2010 — Cross-site scripting (XSS) vulnerability in nessusd_www_server.nbin in the Nessus Web Server plugin 1.2.4 for Nessus allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en nessusd_www_server.nbin del complemento Nessus Web Server v1.2.4 de Nessus. Permite a atacantes remotos inyectar codigo de script web o código HTML a través de vectores de ataque sin especificar. • http://secunia.com/advisories/40722 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 1

30 Jul 2007 — Directory traversal vulnerability in a certain ActiveX control in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the argument to the saveNessusRC method, which writes text specified by the addsetConfig method, possibly related to the SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll. NOTE: this can be leveraged for code execution by writing to a Startup folder. Vulnerabilidad de salto de directorio en un cierto control ActiveX en Nes... • https://www.exploit-db.com/exploits/4237 •

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 2

30 Jul 2007 — The SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to delete arbitrary files via unspecified vectors involving the deleteNessusRC method, probably a directory traversal vulnerability. El control ActiveX SCANCTRL.ScanCtrlCtrl.1 en scan.dll de Nessus Vulnerability Scanner 3.0.6 permite a atacantes remotos borrar archivos de su elección a través de vectores no especificados involucrando el método delteNessusRC, probablemente una vulnerabilidad ... • https://www.exploit-db.com/exploits/4237 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 7%CPEs: 1EXPL: 2

27 Jul 2007 — Directory traversal vulnerability in a certain ActiveX control in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to delete arbitrary files via a .. (dot dot) in the argument to the deleteReport method, probably related to the SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll. Una vulnerabilidad de salto de directorio en un determinado control ActiveX en Nessus Vulnerability Scanner versión 3.0.6, permite a atacantes remotos eliminar archivos arbitrarios por medio de un .. (punto punto) en el a... • https://www.exploit-db.com/exploits/4237 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

03 Jul 2007 — Cross-site scripting (XSS) vulnerability in the Windows GUI in Nessus Vulnerability Scanner before 3.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la interfaz gráfica para Windows de Nessus Vulnerability Scanner anterior a 3.0.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de vectores no especificados. • http://osvdb.org/37011 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

29 Apr 2006 — Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory. • http://securityreason.com/securityalert/817 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — Nessus 2.0.10a stores account passwords in plaintext in .nessusrc files, which allows local users to obtain passwords. NOTE: the original researcher reports that the vendor has disputed this issue • http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1363.html • CWE-255: Credentials Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — NessusWX 1.4.4 stores account passwords in plaintext in .session files, which allows local users to obtain passwords. • http://seclists.org/fulldisclosure/2004/Mar/1343.html • CWE-255: Credentials Management Errors •

CVSS: 7.0EPSS: 0%CPEs: 13EXPL: 0

31 Dec 2004 — A race condition in nessus-adduser in Nessus 2.0.11 and possibly earlier versions, if the TMPDIR environment variable is not set, allows local users to gain privileges. • http://secunia.com/advisories/12127 •