### [CVE-2021-20076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20076) ![](https://img.shields.io/static/v1?label=Product&message=Tenable.sc&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.13.0%20through%205.17.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description Tenable.sc and Tenable.sc Core versions 5.13.0 through 5.17.0 were found to contain a vulnerability that could allow an authenticated, unprivileged user to perform Remote Code Execution (RCE) on the Tenable.sc server via Hypertext Preprocessor unserialization. ### POC #### Reference - https://www.tenable.com/security/tns-2021-03 #### Github No PoCs found on GitHub currently.