Last Modified: Nov. 29, 2023
An arbitrary file write vulnerability exists where an authenticated attacker with privileges on the managing application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.
Tweets last week: 0
Remaining steady
Yahoo results: 327000
Remaining steady
Current EPSS Score: 0.00046
Remaining steady
Reddit Posts: 0
Remaining steady
Github Repos: 0
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: High
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: High
Availability: High
Base Score: 6.5
Exploitability Score:
1.2
Impact Score: 5.2
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CWE-787
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:* Part: a Vendor: tenable | Alle Schwachstellen für tenable |
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>