Page 4 of 70 results (0.021 seconds)

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

28 Jun 2021 — Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20099. Se ha detectado que Nessus Agent versiones 8.2.4 y anteriores para Windows contienen múltiples vulnerabilidades de escalada de privilegios local que podrían permitir a un administrador local autenticado ejecutar determinados ejecutables de Wind... • https://www.tenable.com/security/tns-2021-12 •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

28 Jun 2021 — Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20100. Se ha detectado que Nessus Agent versiones 8.2.4 y anteriores para Windows contienen múltiples vulnerabilidades de escalada de privilegios locales que podrían permitir a un administrador local autenticado ejecutar determinados ejecutables de Wi... • https://www.tenable.com/security/tns-2021-12 •

CVSS: 5.9EPSS: 5%CPEs: 205EXPL: 1

25 Mar 2021 — An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS c... • https://github.com/riptl/cve-2021-3449 • CWE-476: NULL Pointer Dereference •

CVSS: 7.4EPSS: 0%CPEs: 56EXPL: 0

25 Mar 2021 — The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectivel... • http://www.openwall.com/lists/oss-security/2021/03/27/1 • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

05 Nov 2020 — A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability. Una vulnerabilidad en Nessus versiones 8.9.0 a 8.... • https://www.tenable.com/security/tns-2020-07 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

21 Aug 2020 — Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session. Se detectó que Nessus versiones 8.11.0 y anteriores, mantenía sesiones más largas que el período permitido en determinados escenarios. La falta de una expiración apropiada de la sesión podría permitir a atacantes con acceso local iniciar sesión en una sesión de navegad... • https://www.tenable.com/security/tns-2020-06 • CWE-613: Insufficient Session Expiration •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

15 Jul 2020 — Nessus 8.10.0 and earlier were found to contain a Stored XSS vulnerability due to improper validation of input during scan configuration. An authenticated, remote attacker could potentially exploit this vulnerability to execute arbitrary code in a user's session. Tenable has implemented additional input validation mechanisms to correct this issue in Nessus 8.11.0. Se encontró que Nessus versiones 8.10.0 y anteriores, contenían una vulnerabilidad de tipo XSS almacenada debido a una comprobación inapropiada d... • https://www.tenable.com/security/tns-2020-05 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

27 Dec 2019 — Tenable Nessus before 6.8 has a stored XSS issue that requires admin-level authentication to the Nessus UI, and would potentially impact other admins (Tenable IDs 5218 and 5269). Tenable Nessus versiones anteriores a la versión 6.8, tiene un problema de tipo XSS almacenado que requiere autenticación de nivel administrador para la Interfaz de Usuario de Nessus e impactaría potencialmente a otros administradores (IDs de Tenable 5218 y 5269). • http://www.securityfocus.com/bid/92134 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

27 Dec 2019 — Tenable Nessus before 6.8 has a stored XSS issue that requires admin-level authentication to the Nessus UI, and would only potentially impact other admins. (Tenable ID 5198). Tenable Nessus versiones anteriores a la versión 6.8, tiene un problema de tipo XSS almacenado que requiere autenticación de nivel de administrador para la Interfaz de Usuario de Nessus, y solo impactaría potencialmente a otros administradores. (ID de Tenable 5198). • http://www.securityfocus.com/bid/92134 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

23 Oct 2019 — Nessus versions 8.6.0 and earlier were found to contain a Denial of Service vulnerability due to improper validation of specific imported scan types. An authenticated, remote attacker could potentially exploit this vulnerability to cause a Nessus scanner to become temporarily unresponsive. Se detectó que las versiones 8.6.0 y anteriores de Nessus contenían una vulnerabilidad de denegación de servicio debido a una comprobación inapropiada de tipos de escaneo importados específicos. Un atacante remoto autenti... • https://www.tenable.com/security/tns-2019-06 • CWE-20: Improper Input Validation •