Vulnerabilities
Vulnerable Software
Openvas:  Security Vulnerabilities
OpenVAS Manager v2.0.3 allows plugin remote code execution.
CVSS Score
8.8
EPSS Score
0.019
Published
2020-02-06
openvas-scanner before 2011-09-11 creates a temporary file insecurely when generating OVAL system characteristics document with the ovaldi integrated tool enabled. A local attacker could use this flaw to conduct symlink attacks to overwrite arbitrary files on the system.
CVSS Score
7.1
EPSS Score
0.001
Published
2019-11-25
SQL injection vulnerability in OpenVAS Manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary SQL commands via the timezone parameter in a modify_schedule OMP command.
CVSS Score
7.5
EPSS Score
0.004
Published
2014-12-03
OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c.
CVSS Score
7.5
EPSS Score
0.049
Published
2014-05-19
OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC.
CVSS Score
7.5
EPSS Score
0.004
Published
2014-05-19
The send_to_sourcefire function in manage_sql.c in OpenVAS Manager 3.x before 3.0.4 allows remote attackers to execute arbitrary commands via the (1) IP address or (2) port number field in an OMP request.
CVSS Score
7.5
EPSS Score
0.021
Published
2012-11-26
The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).
CVSS Score
9.0
EPSS Score
0.094
Published
2011-01-28


Contact Us

Shodan ® - All rights reserved