An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tenable nessus |