Page 10 of 70 results (0.016 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session. Tenable has released Nessus 8.2.2 to address this issue. Nessus, en versiones 8.2.1 y anteriores, contenía una vulnerabilidad Cross-Site Scripting (XSS) persistente debido a la validación incorrecta de entradas proporcionadas por el usuario. Un atacante remoto autenticado podría explotar esta vulnerabilidad mediante una petición especialmente manipulada para ejecutar código script arbitrario en la sesión de navegación de un usuario. • https://www.tenable.com/security/tns-2019-01 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 41EXPL: 2

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'. SMT (Simultaneous Multi-threading) en los procesadores puede habilitar que usuarios locales exploten software vulnerable a ataques de sincronización mediante un ataques de sincronización de canal lateral en la "contención de puertos". A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information. • https://www.exploit-db.com/exploits/45785 http://www.securityfocus.com/bid/105897 https://access.redhat.com/errata/RHSA-2019:0483 https://access.redhat.com/errata/RHSA-2019:0651 https://access.redhat.com/errata/RHSA-2019:0652 https://access.redhat.com/errata/RHSA-2019:2125 https://access.redhat.com/errata/RHSA-2019:3929 https://access.redhat.com/errata/RHSA-2019:3931 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https& • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-203: Observable Discrepancy •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

In Nessus before 7.1.0, Session Fixation exists due to insufficient session management within the application. An authenticated attacker could maintain system access due to session fixation after a user password change. Se ha descubierto un problema de inyección SQL en Nagios XI en versiones anteriores a la 5.4.13 mediante el parámetro key1 en admin/info.php. • http://www.securitytracker.com/id/1040918 https://www.tenable.com/security/tns-2018-05 • CWE-384: Session Fixation •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

In Nessus before 7.1.0, a XSS vulnerability exists due to improper input validation. A remote authenticated attacker could create and upload a .nessus file, which may be viewed by an administrator allowing for the execution of arbitrary script code in a user's browser session. In other scenarios, XSS could also occur by altering variables from the Advanced Settings. En Nessus, en versiones anteriores a la 7.1.0, existe una vulnerabilidad de Cross-Site Scripting (XSS) debido a una validación de entradas incorrecta. Un atacante remoto autenticado podría crear y subir un archivo .nessus, que podría ser visualizado por un administrador; esto permitiría la ejecución de código script arbitrario en la sesión de navegación de un usuario. • http://www.securitytracker.com/id/1040918 https://www.tenable.com/security/tns-2018-05 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

When installing Nessus to a directory outside of the default location, Nessus versions prior to 7.0.3 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the installation location. Al instalar Nessus en un directorio fuera de la localización por defecto, las versiones anteriores a la 7.0.3 de Nessus no aplicaban permisos seguros para los subdirectorios. Esto podría permitir un escalado de privilegios locales si los usuarios no aseguran los directorios en la ubicación de instalación. • http://www.securitytracker.com/id/1040557 https://www.tenable.com/security/tns-2018-01 • CWE-732: Incorrect Permission Assignment for Critical Resource •