An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Affected Software
| Name |
Vendor |
Start Version |
End Version |
| Nessus |
Tenable |
* |
10.2.0 (excluding) |
References