CVE-2023-3251

A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.9
v2 : unknown
v3 : 4.1
References () https://www.tenable.com/security/tns-2023-29 - Vendor Advisory () https://www.tenable.com/security/tns-2023-29 - Vendor Advisory

01 Sep 2023, 14:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
CWE CWE-522
CPE cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
First Time Tenable nessus
Tenable
References (MISC) https://www.tenable.com/security/tns-2023-29 - (MISC) https://www.tenable.com/security/tns-2023-29 - Vendor Advisory

29 Aug 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-29 19:15

Updated : 2024-11-21 08:16


NVD link : CVE-2023-3251

Mitre link : CVE-2023-3251

CVE.ORG link : CVE-2023-3251


JSON object : View

Products Affected

tenable

  • nessus
CWE
CWE-522

Insufficiently Protected Credentials