{"id":12150,"date":"2022-05-02T06:12:40","date_gmt":"2022-05-02T13:12:40","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=12150"},"modified":"2023-02-06T11:17:32","modified_gmt":"2023-02-06T18:17:32","slug":"cve-2022-28291-sensitive-information-disclosure-in-tenable-nessus-scanner","status":"publish","type":"zerodays","link":"https:\/\/10.42.32.162\/zerodays\/cve-2022-28291-sensitive-information-disclosure-in-tenable-nessus-scanner\/","title":{"rendered":"CVE-2022-28291 – Sensitive Information Disclosure in Tenable Nessus Scanner"},"content":{"rendered":"

An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the \u201cnessusd\u201d process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers\u2019 network of assets.<\/p>\n","protected":false},"featured_media":13545,"parent":0,"menu_order":0,"template":"","meta":{"content-type":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/12150"}],"collection":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":13,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/12150\/revisions"}],"predecessor-version":[{"id":13672,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/12150\/revisions\/13672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media\/13545"}],"wp:attachment":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media?parent=12150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}