This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote host is running a security scanner management service that
is affected by an authentication bypass vulnerability.
Nessus was able to exploit an authentication bypass vulnerability by
sending the 'get_version' command. Successful exploitation of this
vulnerability could allow a remote attacker to take complete control
of an OpenVAS install.
See also :
Upgrade to OpenVAS Manager 4.0.4 / 3.0.7 or higher, and OpenVAS
Administrator 1.3.2 / 1.2.2 or higher.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true