Tenable

Nessus

70 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.82%
  • Veröffentlicht 24.06.2019 17:15:09
  • Zuletzt bearbeitet 30.05.2025 20:15:20

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

  • EPSS 5.05%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...

  • EPSS 0.19%
  • Veröffentlicht 12.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:52

Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to ex...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 15.11.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:45

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

  • EPSS 0.16%
  • Veröffentlicht 18.05.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:17

In Nessus before 7.1.0, Session Fixation exists due to insufficient session management within the application. An authenticated attacker could maintain system access due to session fixation after a user password change.

  • EPSS 0.36%
  • Veröffentlicht 18.05.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:17

In Nessus before 7.1.0, a XSS vulnerability exists due to improper input validation. A remote authenticated attacker could create and upload a .nessus file, which may be viewed by an administrator allowing for the execution of arbitrary script code i...

  • EPSS 0.04%
  • Veröffentlicht 20.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:16

When installing Nessus to a directory outside of the default location, Nessus versions prior to 7.0.3 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in ...

  • EPSS 0.32%
  • Veröffentlicht 04.03.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:35

The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.

  • EPSS 0.1%
  • Veröffentlicht 09.08.2017 12:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x before 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.

  • EPSS 0.13%
  • Veröffentlicht 12.05.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cross-site scripting vulnerability in Nessus versions 6.8.0, 6.8.1, 6.9.0, 6.9.1 and 6.9.2 allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.