On Wed, Jul 28, 2004 at 03:24:41PM +0200, Michael Gysi-Gander wrote:

> I've got this strange problem after a scan. Type and port is:
> Vulnerability ssh (22/tcp).
> 
> But the description is: 
> -----------------------------------------------------
> It is possible to make the remote web server execute
> arbitrary code by sending a lot of data on the remote
> TCP port 81.

I experienced this when I upgrade from 2.0.11 to 2.1.1; removing the
directory .desc from the plugins directory and restarting nessusd fixed
the problem, although results from previous scans were still corrupt. 

George
-- 
[EMAIL PROTECTED]

Attachment: pgpzBQfl5cXJk.pgp
Description: PGP signature

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to