CVS pserver Brute Force Access

This script is Copyright (C) 2003-2012 Tenable Network Security, Inc.

Synopsis :

The remote version control service has accounts that use default

Description :

It was possible to find the public CVS repository of the remote host
by searching a list of commonly used passwords and CVS repositories.
A remote attacker could exploit this to access or modify sensitive

Solution :

Secure all accounts with strong passwords.

Risk factor :

High / CVSS Base Score : 7.5

Family: Misc.

Nessus Plugin ID: 11384 (cvs_public_pserver.nasl)

Bugtraq ID:


Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial