Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Nessus Network Monitor 6.5.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-network-monitor https://www.tenable.com/downloads/nessus-network-monitor ).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49761 | A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI. |
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2024-17 |
|
Mon, 07 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenable
Tenable nessus Network Monitor |
|
| CPEs | cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenable
Tenable nessus Network Monitor |
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI. | |
| Title | XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-09-30T17:22:16.903Z
Reserved: 2024-09-24T16:17:19.544Z
Link: CVE-2024-9158
Updated: 2024-09-30T17:22:12.925Z
Status : Analyzed
Published: 2024-09-30T17:15:05.407
Modified: 2024-10-07T16:13:49.027
Link: CVE-2024-9158
No data.
OpenCVE Enrichment
No data.
EUVD