Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenable nessus agent vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-20118
Nessus Agent 8.3.0 and previous versions was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20117.
Tenable Nessus Agent
7.2
CVSSv2
CVE-2021-20117
Nessus Agent 8.3.0 and previous versions was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118.
Tenable Nessus Agent
7.2
CVSSv2
CVE-2021-20077
Nessus Agent versions 7.2.0 up to and including 8.2.2 were found to inadvertently capture the IAM role security token on the local host during initial linking of the Nessus Agent when installed on an Amazon EC2 instance. This could allow a privileged malicious user to obtain the ...
Tenable Nessus Agent
5.8
CVSSv2
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.1.1
Tenable Nessus 6.1.2
Tenable Nessus 6.2.0
Tenable Nessus 6.2.1
Tenable Nessus 6.5.1
Tenable Nessus 6.5.2
Tenable Nessus 6.5.3
Tenable Nessus 6.5.4
Tenable Nessus 6.10.9
Tenable Nessus 6.10.8
Tenable Nessus 6.10.7
Tenable Nessus 6.10.6
Tenable Nessus 6.3.3
Tenable Nessus 6.3.2
Tenable Nessus 6.3.1
Tenable Nessus 6.3.0
Tenable Nessus 6.6.0
Tenable Nessus 6.7.0
Tenable Nessus 6.8.1
Tenable Nessus 6.8.0
Tenable Nessus 6.10.0
Tenable Nessus 6.0.0
7.2
CVSSv2
CVE-2017-7199
Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local malicious user to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue.
Tenable Nessus 6.7
Tenable Nessus 6.8.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.2
Tenable Nessus 6.8.1
Tenable Nessus 6.9.0
Tenable Nessus 6.10.3
Tenable Nessus 6.9.1
Tenable Nessus 6.9.2
Tenable Nessus 6.6.2
Tenable Nessus 6.9.3
Tenable Nessus 6.10.0
23 Github repositories
2.1
CVSSv2
CVE-2017-7849
Nessus 6.10.x prior to 6.10.5 was found to be vulnerable to a local denial of service condition due to insecure permissions when running in Agent Mode.
Tenable Nessus 6.10.2
Tenable Nessus 6.10.4
Tenable Nessus 6.10.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.3
7.2
CVSSv2
CVE-2017-7850
Nessus 6.10.x prior to 6.10.5 was found to be vulnerable to a local privilege escalation issue due to insecure permissions when running in Agent Mode.
Tenable Nessus 6.10.0
Tenable Nessus 6.10.1
Tenable Nessus 6.10.2
Tenable Nessus 6.10.3
Tenable Nessus 6.10.4
7.2
CVSSv2
CVE-2020-5793
A vulnerability in Nessus versions 8.9.0 up to and including 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local malicious user to copy user-supplied files to a specially constructed path in a specifically named user directory. An ...
Tenable Nessus
Tenable Nessus Agent 8.0.0
Tenable Nessus Agent 8.1.0
8.5
CVSSv2
CVE-2021-20106
Nessus Agent versions 8.2.5 and previous versions were found to contain a privilege escalation vulnerability which could allow a Nessus administrator user to upload a specially crafted file that could lead to gaining administrator privileges on the Nessus host.
Tenable Nessus
4.6
CVSSv2
CVE-2021-20099
Nessus Agent 8.2.4 and previous versions for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20100.
Tenable Nessus
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »