This script is Copyright (C) 2012 Tenable Network Security, Inc.
A shell is listening on the remote host.
The remote host is running a BeanShell interpreter in remote server
mode. This allows network clients to connect to the interpreter and
execute BeanShell commands and arbitrary Java code. A remote,
unauthenticated attacker could exploit this to execute arbitrary
See also :
Filter incoming traffic to this port or disable this service.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gain a shell remotely
Nessus Plugin ID: 58975 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.