Total vulnerabilities in the database
An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present.
Software | From | Fixed in |
---|---|---|
tenable / nessus | - | 10.4.0 |