Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2018-1147First vendor Publication2018-05-18
VendorCveLast vendor Modification2018-06-19

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Cvss Base Score3.5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score6.8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

In Nessus before 7.1.0, a XSS vulnerability exists due to improper input validation. A remote authenticated attacker could create and upload a .nessus file, which may be viewed by an administrator allowing for the execution of arbitrary script code in a user's browser session. In other scenarios, XSS could also occur by altering variables from the Advanced Settings.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1147

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application67

Nessus® Vulnerability Scanner

DateDescription
2018-05-24Name : Tenable Nessus running on the remote host is affected by multiple vulnerabili...
File : nessus_tns_2018_05.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CONFIRM https://www.tenable.com/security/tns-2018-05
SECTRACK http://www.securitytracker.com/id/1040918

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-02-13 12:07:01
  • Multiple Updates
2018-06-19 21:19:53
  • Multiple Updates
2018-05-20 09:18:35
  • Multiple Updates
2018-05-19 05:18:04
  • First insertion