Total vulnerabilities in the database
An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Software | From | Fixed in |
---|---|---|
tenable / nessus | - | 10.2.0 |