Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2019-3923First vendor Publication2019-02-11
VendorCveLast vendor Modification2019-02-12

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Cvss Base Score3.5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score6.8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session. Tenable has released Nessus 8.2.2 to address this issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3923

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application89

Sources (Detail)

SourceUrl
CONFIRM https://www.tenable.com/security/tns-2019-01

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2019-07-30 12:11:01
  • Multiple Updates
2019-07-06 12:03:22
  • Multiple Updates
2019-07-03 12:10:28
  • Multiple Updates
2019-03-06 12:06:41
  • Multiple Updates
2019-02-13 12:07:10
  • Multiple Updates
2019-02-12 12:05:00
  • First insertion