Tenable

Nessus Agent

11 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 21.03.2025 14:13:35
  • Last modified 21.03.2025 15:15:42

When installing Nessus Agent to a non-default location on a Windows host, Nessus Agent versions prior to 10.8.3 did not enforce secure permissions for sub-directories.  This could allow for local privilege escalation if users had not secured the dire...

  • EPSS 0.04%
  • Published 17.05.2024 18:15:07
  • Last modified 21.11.2024 09:29:20

A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus Agent host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host. - CVE-2024-...

  • EPSS 0.04%
  • Published 17.05.2024 17:15:07
  • Last modified 21.11.2024 09:29:20

When installing Nessus Agent to a directory outside of the default location on a Windows host, Nessus Agent versions prior to 10.6.4 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had ...

  • EPSS 0.07%
  • Published 18.03.2024 16:15:09
  • Last modified 21.11.2024 09:09:39

As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific fi...

  • EPSS 0.05%
  • Published 01.11.2023 16:15:08
  • Last modified 21.11.2024 08:42:37

Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.

  • EPSS 0.04%
  • Published 09.09.2021 12:15:08
  • Last modified 21.11.2024 05:45:57

Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20117.

  • EPSS 0.04%
  • Published 09.09.2021 12:15:07
  • Last modified 21.11.2024 05:45:57

Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118.

  • EPSS 0.69%
  • Published 25.03.2021 15:15:13
  • Last modified 21.11.2024 06:21:33

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly ...

  • EPSS 0.04%
  • Published 19.03.2021 19:15:13
  • Last modified 21.11.2024 05:45:53

Nessus Agent versions 7.2.0 through 8.2.2 were found to inadvertently capture the IAM role security token on the local host during initial linking of the Nessus Agent when installed on an Amazon EC2 instance. This could allow a privileged attacker to...

  • EPSS 0.11%
  • Published 05.11.2020 20:15:17
  • Last modified 21.11.2024 05:34:36

A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user direct...