Vulnerability Details CVE-2023-5624
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 26.2%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2023-5624
-
cpe:2.3:a:tenable:nessus_network_monitor:5.10.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.10.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.11.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.11.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.12.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.12.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.13.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.13.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.4
-
cpe:2.3:a:tenable:nessus_network_monitor:5.4.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.5.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.5.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.6.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.6.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.7.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.7.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.8.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.8.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.9.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.9.1