Lucene search

K
TenableNessus

15 matches found

CVE
CVE
added 2019/06/25 9:15 p.m.214 views

CVE-2019-3961

Nessus versions 8.4.0 and earlier were found to contain a reflected XSS vulnerability due to improper validation of user-supplied input. An unauthenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a users brows...

6.1CVSS6.4AI score0.00422EPSS
CVE
CVE
added 2023/08/29 7:15 p.m.180 views

CVE-2023-3252

An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition.

6.8CVSS6.4AI score0.00206EPSS
CVE
CVE
added 2019/10/23 7:15 p.m.88 views

CVE-2019-3982

Nessus versions 8.6.0 and earlier were found to contain a Denial of Service vulnerability due to improper validation of specific imported scan types. An authenticated, remote attacker could potentially exploit this vulnerability to cause a Nessus scanner to become temporarily unresponsive.

6.5CVSS6.4AI score0.00711EPSS
CVE
CVE
added 2018/05/18 10:29 p.m.74 views

CVE-2018-1148

In Nessus before 7.1.0, Session Fixation exists due to insufficient session management within the application. An authenticated attacker could maintain system access due to session fixation after a user password change.

6.5CVSS6.3AI score0.00159EPSS
CVE
CVE
added 2021/06/28 11:15 a.m.71 views

CVE-2021-20099

Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20100.

6.7CVSS7AI score0.00063EPSS
CVE
CVE
added 2022/10/31 8:15 p.m.71 views

CVE-2022-3499

An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present.

6.5CVSS6.2AI score0.00247EPSS
CVE
CVE
added 2022/10/25 5:15 p.m.59 views

CVE-2022-33757

An authenticated attacker could read Nessus Debug Log file attachments from the web UI without having the correct privileges to do so. This may lead to the disclosure of information on the scan target and/or the Nessus scan to unauthorized parties able to reach the Nessus instance.

6.5CVSS6.7AI score0.00203EPSS
CVE
CVE
added 2023/11/20 9:15 p.m.52 views

CVE-2023-6178

An arbitrary file write vulnerability exists where an authenticated attacker with privileges on the managing application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.

6.8CVSS6.4AI score0.00095EPSS
CVE
CVE
added 2022/06/21 3:15 p.m.50 views

CVE-2022-32974

An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.

6.5CVSS7.1AI score0.00336EPSS
CVE
CVE
added 2024/02/07 12:15 a.m.50 views

CVE-2024-0971

A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content.

6.5CVSS6.8AI score0.00125EPSS
CVE
CVE
added 2023/11/20 9:15 p.m.49 views

CVE-2023-6062

An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.

6.8CVSS6.5AI score0.00209EPSS
CVE
CVE
added 2021/06/28 11:15 a.m.48 views

CVE-2021-20100

Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20099.

6.7CVSS7AI score0.00063EPSS
CVE
CVE
added 2014/04/11 3:55 p.m.47 views

CVE-2014-2848

A race condition in the wmi_malware_scan.nbin plugin before 201402262215 for Nessus 5.2.1 allows local users to gain privileges by replacing the dissolvable agent executable in the Windows temp directory with a Trojan horse program.

6.9CVSS6.8AI score0.00035EPSS
CVE
CVE
added 2022/10/17 4:15 p.m.47 views

CVE-2022-28291

Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the “nessusd” process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an atta...

6.5CVSS6.3AI score0.00087EPSS
CVE
CVE
added 2021/11/03 12:15 a.m.46 views

CVE-2021-20135

Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be...

6.7CVSS6.6AI score0.00133EPSS