Логотип exploitDog
bind:CVE-2023-0524
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-0524

Количество 3

Количество 3

nvd логотип

CVE-2023-0524

около 3 лет назад

As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2r3h-3gcc-24g5

больше 2 лет назад

As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-00702

около 3 лет назад

Уязвимость систем безопасности и оценки уязвимостей Nessus, tenable.io, tenable.sc, связанная с ошибками в коде, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-0524

As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-2r3h-3gcc-24g5

As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-00702

Уязвимость систем безопасности и оценки уязвимостей Nessus, tenable.io, tenable.sc, связанная с ошибками в коде, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.1
0%
Низкий
около 3 лет назад

Уязвимостей на страницу