This script is Copyright (C) 2002-2014 Matt Moore
It is possible to obtain the list of Java processes running on the
remote host anonymously, as well as to start and stop them.
The remote host is an Oracle 9iAS server. By default, accessing
the location /oprocmgr-status via HTTP lets an attacker obtain
the list of processes running on the remote host, and even to
to start or stop them.
See also :
Restrict access to /oprocmgr-status in httpd.conf
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.8
Public Exploit Available : true
Nessus Plugin ID: 10851 ()
Bugtraq ID: 4293
CVE ID: CVE-2002-0563
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.