You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
42873,CVE-2016-2183,50,High,192.168.0.100,tcp,3389,SSL Medium Strength Cipher Suites Supported (SWEET32),The remote service supports the use of medium strength SSL ciphers.,"The remote host supports the use of SSL ciphers that offer medium
3
+
strength encryption. Nessus regards medium strength as any encryption
4
+
that uses key lengths at least 64 bits and less than 112 bits, or
5
+
else that uses the 3DES encryption suite.
6
+
7
+
Note that it is considerably easier to circumvent medium strength
8
+
encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of
9
+
medium strength ciphers.","http://www.nessus.org/u?df5555f5
10
+
https://sweet32.info","Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
11213,CVE-2003-1567,50,Medium,192.168.0.100,tcp,443,HTTP TRACE / TRACK Methods Allowed,Debugging functions are enabled on the remote web server.,"The remote web server supports the TRACE and/or TRACK methods. TRACE
26
+
and TRACK are HTTP methods that are used to debug web server
27
+
connections.",Disable these HTTP methods. Refer to the plugin output for more information.,"http://www.nessus.org/u?e979b5cb
28
+
http://www.apacheweek.com/issues/03-01-24
29
+
https://download.oracle.com/sunalerts/1000718.1.html","To disable these methods, add the following lines for each virtual
30
+
host in your configuration file :
31
+
32
+
RewriteEngine on
33
+
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
34
+
RewriteRule .* - [F]
35
+
36
+
Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
37
+
support disabling the TRACE method natively via the 'TraceEnable'
38
+
directive.
39
+
40
+
Nessus sent the following TRACE request : \n\n------------------------------ snip ------------------------------\nTRACE /Nessus2034861839.html HTTP/1.1
41
+
Connection: Close
42
+
Host: 192.168.0.100
43
+
Pragma: no-cache
44
+
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
------------------------------ snip ------------------------------\n\nand received the following response from the remote server :\n\n------------------------------ snip ------------------------------\nHTTP/1.1 200 OK
50
+
Date: Tue, 01 Apr 2025 07:32:30 GMT
51
+
Server: Apache/2.4.37 (rocky) OpenSSL/1.1.1k
52
+
Keep-Alive: timeout=5, max=100
53
+
Connection: Keep-Alive
54
+
Transfer-Encoding: chunked
55
+
Content-Type: message/http
56
+
57
+
58
+
TRACE /Nessus2034861839.html HTTP/1.1
59
+
Connection: Keep-Alive
60
+
Host: 192.168.0.101
61
+
Pragma: no-cache
62
+
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
187315,CVE-2023-48795,54,Medium,192.168.0.100,tcp,22,SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795),The remote SSH server is vulnerable to a mitm prefix truncation attack.,"The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can
69
+
allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security.
70
+
71
+
Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with
72
+
Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software
73
+
versions.",Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.,https://terrapin-attack.com/,"Supports following ChaCha20-Poly1305 Client to Server algorithm : [email protected]
74
+
Supports following Encrypt-then-MAC Client to Server algorithm : [email protected]
75
+
Supports following Encrypt-then-MAC Client to Server algorithm : [email protected]
76
+
Supports following Encrypt-then-MAC Client to Server algorithm : [email protected]
77
+
Supports following Encrypt-then-MAC Client to Server algorithm : [email protected]
78
+
Supports following Encrypt-then-MAC Client to Server algorithm : [email protected]
79
+
Supports following ChaCha20-Poly1305 Server to Client algorithm : [email protected]
80
+
Supports following Encrypt-then-MAC Server to Client algorithm : [email protected]
81
+
Supports following Encrypt-then-MAC Server to Client algorithm : [email protected]
82
+
Supports following Encrypt-then-MAC Server to Client algorithm : [email protected]
83
+
Supports following Encrypt-then-MAC Server to Client algorithm : [email protected]
84
+
Supports following Encrypt-then-MAC Server to Client algorithm : [email protected]",,,,59,42,53,61,7957,Medium,,,,27/12/2023,29/01/2024,,,
85
+
200162,CVE-2024-4577,100,Critical,192.168.0.101,tcp,8080,PHP 8.2.x < 8.2.20 Multiple Vulnerabilities,The version PHP running on the remote web server is affected by multiple vulnerabilities.,"The version of PHP installed on the remote host is prior to 8.2.20. It is, therefore, affected by multiple
86
+
vulnerabilities as referenced in the Version 8.2.20 advisory.
87
+
88
+
- In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-
89
+
CGI on Windows, if the system is set up to use certain code pages, Windows may use Best-Fit behavior to
90
+
replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those
91
+
characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and
92
+
thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. (CVE-2024-4577)
93
+
94
+
- In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error,
95
+
filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of
96
+
URLs the function will result in invalid user information (username + password part of URLs) being treated
97
+
as valid user information. This may lead to the downstream code accepting invalid URLs as valid and
98
+
parsing them incorrectly. (CVE-2024-5458)
99
+
100
+
- In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874
101
+
does not work if the command name includes trailing spaces. Original issue: when using proc_open() command
102
+
with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled
103
+
by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
104
+
(CVE-2024-5585)
105
+
106
+
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
107
+
number.",Upgrade to PHP version 8.2.20 or later.,http://php.net/ChangeLog-8.php#8.2.20,"URL : http://192.168.0.101:8080/ (8.2.18 under X-Powered-By: PHP/8.2.18)
108
+
Installed version : 8.2.18
109
+
Fixed version : 8.2.20",I,,,98,87,94,96,9438,Critical,,CISA-KNOWN-EXPLOITED:2024/07/03;IAVA:2024-A-0330-S,,06/06/2024,23/10/2024,TRUE,TRUE,TRUE
110
+
200798,CVE-2024-23443,61,Medium,192.168.0.101,tcp,5601,Kibana < 7.17.22 / 8.0.x < 8.14 (ESA-2024-11),The remote host is missing a security update.,"The version of Kibana installed on the remote host is prior to 7.17.22 or 8.14. It is, therefore, affected by a
111
+
vulnerability as referenced in the ESA-2024-11 advisory.
112
+
113
+
- A high-privileged user, allowed to create custom osquery packs 17 could affect the availability of Kibana
114
+
by uploading a maliciously crafted osquery pack.
115
+
116
+
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
117
+
number.",Upgrade to Kibana version 7.17.22 / 8.14 or later.,http://www.nessus.org/u?064dcada,"URL : https://192.168.0.101:5601/
118
+
Installed version : 7.13.2
119
+
Fixed version : 7.17.22",II,,,49,45,43,36,2783,Medium,,IAVB:2024-B-0080-S,,21/06/2024,20/8/2024,,,
0 commit comments