{"osvdb": [{"lastseen": "2017-04-28T13:19:59", "bulletinFamily": "software", "description": "## Vulnerability Description\nNessusWX contains a flaw that may lead to an unauthorized password exposure. It is possible for a malicious user to gain access to plaintext usernames and passwords by locating plugin configuration settings in directories ending with \".session\" under the NessusDB directory tree, leading to a loss of confidentiality.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNessusWX contains a flaw that may lead to an unauthorized password exposure. It is possible for a malicious user to gain access to plaintext usernames and passwords by locating plugin configuration settings in directories ending with \".session\" under the NessusDB directory tree, leading to a loss of confidentiality.\n## Manual Testing Notes\nLook for the presence of session files such as:\nC:\\NessusDB\\MySession.session\n\n## References:\nVendor URL: http://nessuswx.nessus.org\nSecurity Tracker: 1009577\nOther Advisory URL: http://www.securitytracker.com/alerts/2004/Mar/1009577.html\nOther Advisory URL: http://seclists.org/fulldisclosure/2004/Mar/1343.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1363.html\nMail List Post: http://archives.neohapsis.com/archives/sf/ms/2004-q2/0001.html\nISS X-Force ID: 15641\n[CVE-2004-2723](https://vulners.com/cve/CVE-2004-2723)\nBugtraq ID: 9993\n", "modified": "2004-03-26T00:00:00", "published": "2004-03-26T00:00:00", "id": "OSVDB:4814", "href": "https://vulners.com/osvdb/OSVDB:4814", "title": "NessusWX Username and Password Disclosure", "type": "osvdb", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}