Quantcast
Channel: Active questions tagged nessus - Stack Overflow
Viewing all articles
Browse latest Browse all 232

How can get the reproduce/test procedure for the vulnerabilities reported by NESSUS?

$
0
0

My NESSUS scanning gives report that there are vulnerabilities in my host, such as:

>     Vulnerabilities by PluginExpand All | Collapse All
>     **11801 (1) - HTTP Method Remote Format String-**
>     **Synopsis**
>     It is possible to execute code on the remote host through the web server.
>     DescriptionThe remote web server seems to be vulnerable to a format string attack on the method name. An attacker might use this
> flaw to make it crash or even execute arbitrary code on this host.
>     **Solution**
>     Upgrade your software or contact your vendor and inform him of this vulnerability.

I expect that the tool should give the detailed http request used that can crash my http server, but it is not included in the report. So I am in difficulty to investigate/remedy this vulnerability.

Please help to suggest how I can figure out the http request used which can crash my server? Can the NESSUS tool have this information provided?


Viewing all articles
Browse latest Browse all 232

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>