Description
An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks.
No analysis available yet.
Remediation
Vendor Solution
Tenable has released Security Center 6.3.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center https://www.tenable.com/downloads/security-center
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-17221 | An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2024-02 |
|
History
Tue, 19 Nov 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenable
Tenable security Center |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenable
Tenable security Center |
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-01T18:40:21.183Z
Reserved: 2024-02-13T16:23:15.200Z
Link: CVE-2024-1471
Updated: 2024-08-01T18:40:21.183Z
Status : Modified
Published: 2024-02-14T22:15:47.953
Modified: 2024-11-21T08:50:39.250
Link: CVE-2024-1471
No data.
OpenCVE Enrichment
No data.
EUVD