{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T02:15:02.776","vulnerabilities":[{"cve":{"id":"CVE-2023-6062","sourceIdentifier":"vulnreport@tenable.com","published":"2023-11-20T21:15:08.387","lastModified":"2024-11-21T08:43:04.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nAn arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition. \n\n"},{"lang":"es","value":"Existe una vulnerabilidad de escritura de archivos arbitraria donde un atacante remoto autenticado con privilegios de administrador en la aplicación Nessus podría alterar las variables de las reglas de Nessus para sobrescribir archivos arbitrarios en el host remoto, lo que podría conducir a una condición de Denegación de Servicio."}],"metrics":{"cvssMetricV31":[{"source":"vulnreport@tenable.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*","versionEndExcluding":"10.5.7","matchCriteriaId":"E52FDAC2-BEB6-4993-8C5B-26FB5E1F8732"},{"vulnerable":true,"criteria":"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*","versionStartIncluding":"10.6.0","versionEndExcluding":"10.6.3","matchCriteriaId":"495739A4-94BD-48F8-8C6B-24F7E06F7275"}]}]}],"references":[{"url":"https://www.tenable.com/security/tns-2023-39","source":"vulnreport@tenable.com","tags":["Vendor Advisory"]},{"url":"https://www.tenable.com/security/tns-2023-40","source":"vulnreport@tenable.com","tags":["Vendor Advisory"]},{"url":"https://www.tenable.com/security/tns-2023-39","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tenable.com/security/tns-2023-40","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}