CVS pserver Brute Force Access

This script is Copyright (C) 2003-2012 Tenable Network Security, Inc.

Synopsis :

The remote version control service has accounts that use default

Description :

It was possible to find the public CVS repository of the remote host
by searching a list of commonly used passwords and CVS repositories.
A remote attacker could exploit this to access or modify sensitive

Solution :

Secure all accounts with strong passwords.

Risk factor :

High / CVSS Base Score : 7.5

Family: Misc.

Nessus Plugin ID: 11384 (cvs_public_pserver.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now