Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Nessus
(Tenable)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 64 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-01-10 | CVE-2022-22823 | build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. | Debian_linux, Libexpat, Sinema_remote_connect_server, Nessus | 9.8 | ||
2022-01-10 | CVE-2022-22824 | defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. | Debian_linux, Libexpat, Sinema_remote_connect_server, Nessus | 9.8 | ||
2022-01-10 | CVE-2022-22825 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. | Debian_linux, Libexpat, Sinema_remote_connect_server, Nessus | 8.8 | ||
2022-01-10 | CVE-2022-22826 | nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. | Debian_linux, Libexpat, Sinema_remote_connect_server, Nessus | 8.8 | ||
2022-01-10 | CVE-2022-22827 | storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. | Debian_linux, Libexpat, Sinema_remote_connect_server, Nessus | 8.8 | ||
2022-01-24 | CVE-2022-23852 | Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES. | Debian_linux, Libexpat, Clustered_data_ontap, Oncommand_workflow_automation, Communications_metasolv_solution, Sinema_remote_connect_server, Nessus | 9.8 | ||
2022-01-26 | CVE-2022-23990 | Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function. | Debian_linux, Fedora, Libexpat, Communications_metasolv_solution, Sinema_remote_connect_server, Nessus | 7.5 | ||
2022-10-31 | CVE-2022-3499 | An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present. | Nessus | 6.5 | ||
2023-03-15 | CVE-2022-4313 | A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets. | Nessus, Plugin_feed | 8.8 | ||
2023-06-26 | CVE-2023-2005 | Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 . This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges. | Nessus, Securitycenter, Tenable\.io | 8.8 |