![]() ![]() Script_set_attribute(attribute:"description",value: "The remote web server is affected by multiple vulnerabilities.") Script_set_attribute(attribute:"synopsis",value: Script_summary(english:"Tests the version of the remote Abyss server.") Script_name(english:"Abyss Web Server GET Request Multiple Vulnerabilities") This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. This is the abyss_overflow.nasl nessus plugin source code. Upgrading to Abyss 1.1.6 or newer is reported to fix the problem. An attacker could use this vulnerability to launch cross-site scripting attacks. In addition, it is possible to inject malicious data into server response headers using a specially crafted GET request. Such versions are reportedly vulnerable to a buffer overflow that could be exploited by an attacker to execute arbitrary code on the host. The remote Abyss Web server is earlier than version 1.1.6. The remote web server is affected by multiple vulnerabilities. Name: Abyss Web Server GET Request Multiple VulnerabilitiesÄependencies: find_service1.nasl, http_version.nasl, no404.nasl Vulnerability Information ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |