On Wed, Jul 28, 2004 at 03:24:41PM +0200, Michael Gysi-Gander wrote: > I've got this strange problem after a scan. Type and port is: > Vulnerability ssh (22/tcp). > > But the description is: > ----------------------------------------------------- > It is possible to make the remote web server execute > arbitrary code by sending a lot of data on the remote > TCP port 81.
I experienced this when I upgrade from 2.0.11 to 2.1.1; removing the directory .desc from the plugins directory and restarting nessusd fixed the problem, although results from previous scans were still corrupt. George -- [EMAIL PROTECTED]
pgpzBQfl5cXJk.pgp
Description: PGP signature
_______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
