7 results (0.002 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

05 Feb 2020 — OpenVAS Manager v2.0.3 allows plugin remote code execution. OpenVAS Manager versión v2.0.3, permite una ejecución de código remota del plugin. • https://www.openwall.com/lists/oss-security/2011/04/20/5 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

25 Nov 2019 — openvas-scanner before 2011-09-11 creates a temporary file insecurely when generating OVAL system characteristics document with the ovaldi integrated tool enabled. A local attacker could use this flaw to conduct symlink attacks to overwrite arbitrary files on the system. openvas-scanner antes del 11-09-2011 crea un archivo temporal de forma no segura cuando se genera el documento de características del sistema OVAL con la herramienta integrada ovaldi habilitada. Un atacante local podría usar este fallo para... • https://access.redhat.com/security/cve/cve-2011-3351 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.8EPSS: 0%CPEs: 23EXPL: 0

03 Dec 2014 — SQL injection vulnerability in OpenVAS Manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary SQL commands via the timezone parameter in a modify_schedule OMP command. Vulnerabilidad de inyección SQL en OpenVAS Manager anterior a 4.0.6 y 5.x anterior a 5.0.7 permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro timezone en un comando OMP modify_schedule. • http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147753.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

15 Nov 2013 — OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC. OpenVAS Administrator 1.2 anterior a 1.2.2 y 1.3 anterior a 1.3.2 permite a atacantes remotos evadir las restricciones de autenticación OAP y ejecutar comandos OAP a través de una solicitud OAP manipulada para información de versión, lo que causa que e... • http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 4%CPEs: 26EXPL: 1

15 Nov 2013 — OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c. OpenVAS Manager 3.0 anterior a 3.0.7 y 4.0 anterior a 4.0.4 permite a atacantes remotos evadir las restricciones de autenticación OMP y ejecutar comandos OMP a través de una solicitud OMP m... • https://www.exploit-db.com/exploits/34026 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 2%CPEs: 13EXPL: 2

13 Nov 2012 — The send_to_sourcefire function in manage_sql.c in OpenVAS Manager 3.x before 3.0.4 allows remote attackers to execute arbitrary commands via the (1) IP address or (2) port number field in an OMP request. La función send_to_sourcefire en manage_sql.c en OpenVAS Manager v3.x antes de v3.0.4 permite a atacantes remotos ejecutar código arbitrario a través de la dirección IP (1) o (2) el campo Número de puerto en una solicitud de OMP. It has been identified that OpenVAS Manager is vulnerable to command injectio... • https://packetstorm.news/files/id/118056 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 9%CPEs: 17EXPL: 3

26 Jan 2011 — The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA). La función email manage_sql.c en OpenVAS Manager v1.0.x a ka v1.0.3 y v2.0.x a la v2.0rc2 permite a usuarios autenticados remotamente ejecutar comandos de su elección a través de los campos (1) To or (2) From en una petición OMP al Greenbone Secu... • https://www.exploit-db.com/exploits/16086 • CWE-20: Improper Input Validation •