📦 Nessus Network Monitor
by Tenable
🔍 What is Nessus Network Monitor?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Tenable Network Monitor versions before 6.5.1 have insecure directory permissions when installed to non-default locations on Windows, allowing local users to potentially escalate privileges. This affe...
This vulnerability allows low-privileged Windows users to escalate privileges to SYSTEM level by replacing a specially crafted file in Nessus Network Monitor. It affects organizations running vulnerab...
This vulnerability in NNM (Network Node Manager) allows low-privileged users to execute arbitrary code with SYSTEM privileges when NNM is installed in a non-standard directory. It affects systems wher...
This OpenSSL vulnerability allows attackers to cause buffer overruns when applications directly construct ASN.1 strings without proper NUL termination. Exploitation can lead to denial of service or me...
This OpenSSL vulnerability allows certificate chain validation to be bypassed when the X509_V_FLAG_X509_STRICT flag is explicitly set. It affects applications using OpenSSL 1.1.1h-1.1.1j that enable s...
This OpenSSL vulnerability involves integer overflow in cryptographic functions (EVP_CipherUpdate, EVP_EncryptUpdate, EVP_DecryptUpdate) when processing input near maximum permissible length. The over...