A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43927 | A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0. |
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2023-29 |
|
Mon, 30 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-09-30T15:49:08.054Z
Reserved: 2023-06-14T19:51:19.650Z
Link: CVE-2023-3251
Updated: 2024-08-02T06:48:08.181Z
Status : Modified
Published: 2023-08-29T19:15:27.023
Modified: 2024-11-21T08:16:48.053
Link: CVE-2023-3251
No data.
OpenCVE Enrichment
No data.
EUVD