Nessus Agent Windows Flaw Enables SYSTEM-Level Code Execution
Tenable has disclosed a high-severity security vulnerability in its Nessus Agent software for Windows that could allow attackers to execute malicious code with full SYSTEM-level privileges. The flaw, tracked as CVE-2026-33694, has been patched in the newly released Nessus Agent version 11.1.3. The v
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Hamas organizing pro-Palestinian protests, raising funds in Netherlands, Dutch intelligence says
- [CYBER] Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access
- [CYBER] CVE-2026-7112 - NousResearch hermes-agent API_SERVER_KEY api_server.py _check_auth improper authentication
- [CYBER] CVE-2026-33454 - Apache Camel: Inbound Header Filter Missing in MailHeaderFilterStrategy Allows Remote Code Execution via MIME Header Injection (CVE-2025-30177 Variant)
- [CYBER] CVE-2026-40022 - Apache Camel Platform HTTP Main: Authentication Bypass on Non-Root Context Paths in camel main runtime
- [CYBER] CVE-2026-40858 - Apache Camel: Camel-Infinispan: Unsafe Deserialization in Remote Aggregation Repository