(#Several vulnerabilities were reported in AlienVault USM:#- cross-site scripting when import NBE. A remote attacker could exploit it by enticing their victim into following a specially crafted link in order to upload an arbitrary NBE file thus allowing arbitrary JavaScript code execution. This vulnerability, located in the "/ossim/vulnmeter/import_nbe.php" web page, stems from inconsistent management of temporary files and predictable filenames in the web root and failure to set a "Content-Type header"##- arbitrary code execution. A remote attacker could exploit it by connecting to Erlang daemon 4369 port in order to execute arbitrary code with RabbitMQ privileges. This vulnerability stems from USM which uses a static cookie value stored in "/var/lib/rabbitmq/.erlang.cookie" file.##Proofs of concept are available.)