Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
nessus vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv2
CVE-2004-1445
A race condition in nessus-adduser in Nessus 2.0.11 and possibly earlier versions, if the TMPDIR environment variable is not set, allows local users to gain privileges.
Nessus Nessus 2.0.3
Nessus Nessus 2.0.4
Nessus Nessus 2.0
Nessus Nessus 2.0.1
Nessus Nessus 2.0.10
Nessus Nessus 2.0.7
Nessus Nessus 2.0.8
Nessus Nessus 2.0.11
Nessus Nessus 2.0.2
Nessus Nessus 2.0.9
Nessus Nessus 2.1.0
Nessus Nessus 2.0.5
Nessus Nessus 2.0.6
2.6
CVSSv2
CVE-2006-2093
Nessus prior to 2.2.8, and 3.x prior to 3.0.3, allows user-assisted malicious users to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security te...
Nessus Nessus 2.2.2
Nessus Nessus 2.2.3
Nessus Nessus 2.2.0 Rc1
Nessus Nessus 2.2.1
Nessus Nessus 2.2.0
Nessus Nessus
Nessus Nessus 2.2.5
Nessus Nessus 2.2.6
5.8
CVSSv2
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.1.1
Tenable Nessus 6.1.2
Tenable Nessus 6.2.0
Tenable Nessus 6.2.1
Tenable Nessus 6.5.1
Tenable Nessus 6.5.2
Tenable Nessus 6.5.3
Tenable Nessus 6.5.4
Tenable Nessus 6.10.9
Tenable Nessus 6.10.8
Tenable Nessus 6.10.7
Tenable Nessus 6.10.6
Tenable Nessus 6.3.3
Tenable Nessus 6.3.2
Tenable Nessus 6.3.1
Tenable Nessus 6.3.0
Tenable Nessus 6.6.0
Tenable Nessus 6.7.0
Tenable Nessus 6.8.1
Tenable Nessus 6.8.0
Tenable Nessus 6.10.0
Tenable Nessus 6.0.0
7.2
CVSSv2
CVE-2017-7199
Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local malicious user to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue.
Tenable Nessus 6.7
Tenable Nessus 6.8.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.2
Tenable Nessus 6.8.1
Tenable Nessus 6.9.0
Tenable Nessus 6.10.3
Tenable Nessus 6.9.1
Tenable Nessus 6.9.2
Tenable Nessus 6.6.2
Tenable Nessus 6.9.3
Tenable Nessus 6.10.0
23 Github repositories
2.1
CVSSv2
CVE-2017-7849
Nessus 6.10.x prior to 6.10.5 was found to be vulnerable to a local denial of service condition due to insecure permissions when running in Agent Mode.
Tenable Nessus 6.10.2
Tenable Nessus 6.10.4
Tenable Nessus 6.10.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.3
7.2
CVSSv2
CVE-2017-7850
Nessus 6.10.x prior to 6.10.5 was found to be vulnerable to a local privilege escalation issue due to insecure permissions when running in Agent Mode.
Tenable Nessus 6.10.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.2
Tenable Nessus 6.10.3
Tenable Nessus 6.10.4
3.5
CVSSv2
CVE-2017-2122
Cross-site scripting vulnerability in Nessus versions 6.8.0, 6.8.1, 6.9.0, 6.9.1 and 6.9.2 allows remote authenticated malicious users to inject arbitrary web script or HTML via unspecified vectors.
Tenable Nessus 6.8.0
Tenable Nessus 6.8.1
Tenable Nessus 6.9.0
Tenable Nessus 6.9.1
Tenable Nessus 6.9.2
3.5
CVSSv2
CVE-2016-9259
Cross-site scripting (XSS) vulnerability in Tenable Nessus prior to 6.9.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Tenable Nessus 6.8
Tenable Nessus 6.8.1
Tenable Nessus 6.8.2
Tenable Nessus 6.9
5
CVSSv2
CVE-2014-4980
The /server/properties resource in Tenable Web UI prior to 2.3.5 for Nessus 5.2.3 up to and including 5.2.7 allows remote malicious users to obtain sensitive information via the token parameter.
Tenable Nessus 5.2.6
Tenable Nessus 5.2.7
Tenable Web Ui
Tenable Nessus 5.2.3
Tenable Nessus 5.2.4
Tenable Nessus 5.2.5
4.3
CVSSv2
CVE-2007-3546
Cross-site scripting (XSS) vulnerability in the Windows GUI in Nessus Vulnerability Scanner prior to 3.0.6 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Nessus Nessus
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »