Vulnerabilities > Tenable > Nessus > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-07 | CVE-2024-0955 | Cross-site Scripting vulnerability in Tenable Nessus A stored XSS vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus proxy settings, which could lead to the execution of remote arbitrary scripts. | 4.8 |
2024-02-07 | CVE-2024-0971 | SQL Injection vulnerability in Tenable Nessus A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content. | 6.5 |
2023-11-20 | CVE-2023-6062 | Out-of-bounds Write vulnerability in Tenable Nessus An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition. | 6.5 |
2023-11-20 | CVE-2023-6178 | Out-of-bounds Write vulnerability in Tenable Nessus An arbitrary file write vulnerability exists where an authenticated attacker with privileges on the managing application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition. | 6.5 |
2023-08-29 | CVE-2023-3253 | Unspecified vulnerability in Tenable Nessus An improper authorization vulnerability exists where an authenticated, low privileged remote attacker could view a list of all the users available in the application. | 4.3 |
2023-08-29 | CVE-2023-3251 | Insufficiently Protected Credentials vulnerability in Tenable Nessus A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0. | 4.9 |
2023-08-29 | CVE-2023-3252 | Unspecified vulnerability in Tenable Nessus An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition. | 6.5 |
2022-10-31 | CVE-2022-3499 | Information Exposure Through Log Files vulnerability in Tenable Nessus An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present. | 6.5 |
2022-10-25 | CVE-2022-33757 | Unspecified vulnerability in Tenable Nessus An authenticated attacker could read Nessus Debug Log file attachments from the web UI without having the correct privileges to do so. | 6.5 |
2022-10-17 | CVE-2022-28291 | Insufficiently Protected Credentials vulnerability in Tenable Nessus Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the “nessusd” process in cleartext via process dumping. | 6.5 |