Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cleartext Storage of Sensitive Information vulnerabilities in an interactive lesson.
Start learningUpgrade mickem/nscp
to version 0.8.0 or higher.
Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information due to the nsclient.ini
configuration file storing administrative credentials in plaintext, which are accessible to local users. An attacker can gain administrative access to the web interface by extracting these credentials and then execute arbitrary commands as SYSTEM by abusing the ExternalScripts plugin to register and trigger custom scripts through the API. This is only exploitable if both the web interface and ExternalScripts features are enabled.