Filtered by vendor Openvas Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2014-9220 3 Fedoraproject, Opensuse, Openvas 3 Fedora, Opensuse, Openvas Manager 2024-11-21 N/A
SQL injection vulnerability in OpenVAS Manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary SQL commands via the timezone parameter in a modify_schedule OMP command.
CVE-2013-6766 1 Openvas 1 Openvas Administrator 2024-11-21 N/A
OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC.
CVE-2013-6765 1 Openvas 1 Openvas Manager 2024-11-21 N/A
OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c.
CVE-2012-5520 1 Openvas 1 Openvas Manager 2024-11-21 N/A
The send_to_sourcefire function in manage_sql.c in OpenVAS Manager 3.x before 3.0.4 allows remote attackers to execute arbitrary commands via the (1) IP address or (2) port number field in an OMP request.
CVE-2011-3351 1 Openvas 1 Openvas-scanner 2024-11-21 7.1 High
openvas-scanner before 2011-09-11 creates a temporary file insecurely when generating OVAL system characteristics document with the ovaldi integrated tool enabled. A local attacker could use this flaw to conduct symlink attacks to overwrite arbitrary files on the system.
CVE-2011-1597 1 Openvas 1 Openvas Manager 2024-11-21 8.8 High
OpenVAS Manager v2.0.3 allows plugin remote code execution.
CVE-2011-0018 1 Openvas 1 Openvas Manager 2024-11-21 N/A
The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).