Show plain JSON{"id": "CVE-2020-5765", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.4, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.3}]}, "published": "2020-07-15T13:15:10.350", "references": [{"url": "https://www.tenable.com/security/tns-2020-05", "tags": ["Vendor Advisory"], "source": "vulnreport@tenable.com"}, {"url": "https://www.tenable.com/security/tns-2020-05", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Nessus 8.10.0 and earlier were found to contain a Stored XSS vulnerability due to improper validation of input during scan configuration. An authenticated, remote attacker could potentially exploit this vulnerability to execute arbitrary code in a user's session. Tenable has implemented additional input validation mechanisms to correct this issue in Nessus 8.11.0."}, {"lang": "es", "value": "Se encontr\u00f3 que Nessus versiones 8.10.0 y anteriores, conten\u00edan una vulnerabilidad de tipo XSS almacenada debido a una comprobaci\u00f3n inapropiada de la entrada durante la configuraci\u00f3n del escaneo. Un atacante remoto autenticado podr\u00eda explotar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en la sesi\u00f3n de usuario. Tenable ha implementado mecanismos de comprobaci\u00f3n de entrada adicionales para corregir este problema en Nessus versi\u00f3n 8.11.0"}], "lastModified": "2024-11-21T05:34:33.807", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "039CA203-CD07-48BD-B59C-68D85980BA8D", "versionEndIncluding": "8.10.0"}], "operator": "OR"}]}], "sourceIdentifier": "vulnreport@tenable.com"}