An authenticated attacker could read Nessus Debug Log file attachments from the web UI without having the correct privileges to do so. This may lead to the disclosure of information on the scan target and/or the Nessus scan to unauthorized parties able to reach the Nessus instance.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nessus | Tenable | * | 10.2.0 (excluding) |