Tenable.sc versions 5.14.0 through 5.19.1 were found to contain a remote code execution vulnerability which could allow a remote, unauthenticated attacker to execute code under special circumstances. An attacker would first have to stage a specific file type in the web server root of the Tenable.sc host prior to remote exploitation.
References
Link | Resource |
---|---|
https://www.tenable.com/security/tns-2022-01 | Vendor Advisory |
https://www.tenable.com/security/tns-2022-01 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/tns-2022-01 - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
22 Jan 2022, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.tenable.com/security/tns-2022-01 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.1 |
CWE | CWE-94 | |
CPE | cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* |
14 Jan 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-14 20:15
Updated : 2024-11-21 06:37
NVD link : CVE-2022-0130
Mitre link : CVE-2022-0130
CVE.ORG link : CVE-2022-0130
JSON object : View
Products Affected
tenable
- tenable.sc
CWE