2022-06-21 14:23:31
tenable
PUBLISHED
An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.