Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-0524

EPSS 0.16% · P37
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-0524

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tenable.Sc 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenable Network Security Tenable.Sc是美国Tenable Network Security公司的一套漏洞分析解决方案。该产品支持实时漏洞评估和管理等。 tenable产品存在安全漏洞,该漏洞源于其允许具有足够权限的攻击者修改环境变量并滥用受影响的插件以提升权限。以下产品受到影响:tenable.io、tenable.sc、Nessus。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Tenable.io, Tenable.sc, Nessus Tenable plugin feed serial numbers less than #202212212055. -

II. Public POCs for CVE-2023-0524

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-0524

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-02-01 · 44 CVEs total

CVE-2022-309048.2 HIGHBluetooth Mesh 缓冲区错误漏洞
CVE-2022-313638.2 HIGHBluetooth Mesh 缓冲区错误漏洞
CVE-2022-313648.2 HIGHBluetooth Mesh 缓冲区错误漏洞
CVE-2022-259167.4 HIGHmt7688-wiscan 安全漏洞
CVE-2022-259067.4 HIGHis-http2 操作系统命令注入漏洞
CVE-2023-24610NOSH ChartingSystem 代码问题漏洞
CVE-2023-0454OrangeScrum 路径遍历漏洞
CVE-2023-23131Selfwealth 安全漏洞
CVE-2023-23135Ftdms 代码问题漏洞
CVE-2023-23132Selfwealth 信任管理问题漏洞
CVE-2023-23136lmxcms 路径遍历漏洞
CVE-2023-23078ZOHO ManageEngine ServiceDesk Plus 跨站脚本漏洞
CVE-2023-23077ZOHO ManageEngine ServiceDesk Plus 跨站脚本漏洞
CVE-2023-23076ZOHO ManageEngine SupportCenter Plus 操作系统命令注入漏洞
CVE-2023-23075ZOHO ManageEngine AssetExplorer 跨站脚本漏洞
CVE-2023-23074ZOHO ManageEngine ServiceDesk Plus 跨站脚本漏洞
CVE-2023-23073ZOHO ManageEngine ServiceDesk Plus 跨站脚本漏洞
CVE-2023-20856VMware vRealize Operations 跨站请求伪造漏洞
CVE-2023-0587Trend Micro Apex One 代码问题漏洞
CVE-2023-25012Linux kernel 资源管理错误漏洞

Showing top 20 of 44 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-0524

No comments yet


Leave a comment