A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local malicious user to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tenable nessus_network_monitor 5.11.0 |
||
tenable nessus_network_monitor 5.11.1 |
||
tenable nessus_network_monitor 5.12.0 |