An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-17221 | An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks. |
Fixes
Solution
Tenable has released Security Center 6.3.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center https://www.tenable.com/downloads/security-center
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.tenable.com/security/tns-2024-02 |
![]() ![]() ![]() |
History
Tue, 19 Nov 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenable
Tenable security Center |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
Vendors & Products |
Tenable
Tenable security Center |

Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-01T18:40:21.183Z
Reserved: 2024-02-13T16:23:15.200Z
Link: CVE-2024-1471

Updated: 2024-08-01T18:40:21.183Z

Status : Modified
Published: 2024-02-14T22:15:47.953
Modified: 2024-11-21T08:50:39.250
Link: CVE-2024-1471

No data.

No data.