2025-04-18 19:17:30
tenable
PUBLISHED
In Nessus versions prior to 10.8.4, a non-authenticated attacker could alter Nessus logging entries by manipulating http requests to the application.