CVE-2025-24917
- EPSS 0.01%
- Veröffentlicht 23.05.2025 15:59:20
- Zuletzt bearbeitet 23.10.2025 14:33:56
In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.
CVE-2025-24916
- EPSS 0.01%
- Veröffentlicht 23.05.2025 15:46:02
- Zuletzt bearbeitet 23.10.2025 14:35:21
When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had ...
CVE-2024-9158
- EPSS 0.26%
- Veröffentlicht 30.09.2024 17:15:05
- Zuletzt bearbeitet 07.10.2024 16:13:49
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
CVE-2023-5622
- EPSS 0.06%
- Veröffentlicht 26.10.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:42:08
Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
CVE-2023-5623
- EPSS 0.06%
- Veröffentlicht 26.10.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:42:08
NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
CVE-2023-5624
- EPSS 0.09%
- Veröffentlicht 26.10.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:42:08
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
CVE-2021-3711
- EPSS 2.35%
- Veröffentlicht 24.08.2021 15:15:09
- Zuletzt bearbeitet 21.11.2024 06:22:12
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen...
CVE-2021-3712
- EPSS 0.49%
- Veröffentlicht 24.08.2021 15:15:09
- Zuletzt bearbeitet 21.11.2024 06:22:13
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the s...
CVE-2021-3449
- EPSS 10.19%
- Veröffentlicht 25.03.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:33
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but incl...
CVE-2021-3450
- EPSS 0.57%
- Veröffentlicht 25.03.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:33
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly ...