
CVE-2023-0524
https://notcve.org/view.php?id=CVE-2023-0524
01 Feb 2023 — As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been d... • https://www.tenable.com/security/tns-2023-04 • CWE-269: Improper Privilege Management •

CVE-2023-24495
https://notcve.org/view.php?id=CVE-2023-24495
25 Jan 2023 — A Server Side Request Forgery (SSRF) vulnerability exists in Tenable.sc due to improper validation of session & user-accessible input data. A privileged, authenticated remote attacker could interact with external and internal services covertly. Existe una vulnerabilidad Server Side Request Forgery (SSRF) en Tenable.sc debido a una validación incorrecta de la sesión y del proceso. datos de entrada accesibles para el usuario. Un atacante remoto autenticado y privilegiado podría interactuar con servicios inter... • https://www.tenable.com/security/tns-2023-03 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-0476
https://notcve.org/view.php?id=CVE-2023-0476
25 Jan 2023 — A LDAP injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could generate data in Active Directory using the application account through blind LDAP injection. Existe una vulnerabilidad de inyección LDAP en Tenable.sc debido a una validación incorrecta de la entrada proporcionada por el usuario antes de devolverla a los usuarios. Un atacante autenticado podría generar datos en Active Directory utilizando la cue... • https://www.tenable.com/security/tns-2023-03 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2023-24493
https://notcve.org/view.php?id=CVE-2023-24493
25 Jan 2023 — A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host. Existe una vulnerabilidad de inyección de fórmula en Tenable.sc debido a una validación incorrecta de la entrada proporcionada por el usuario antes de devolverla a los usuarios. Un atacante autenticado podría... • https://www.tenable.com/security/tns-2023-03 • CWE-20: Improper Input Validation •

CVE-2023-24494
https://notcve.org/view.php?id=CVE-2023-24494
25 Jan 2023 — A stored cross-site scripting (XSS) vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session. Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en Tenable.sc debido a una validación incorrecta de la entrada proporcionada por el usuario antes de devolverla a los usuarios... • https://www.tenable.com/security/tns-2023-03 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-24828 – Missing input validation can lead to command execution in composer
https://notcve.org/view.php?id=CVE-2022-24828
13 Apr 2022 — Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagis... • https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709 • CWE-20: Improper Input Validation CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2022-24785 – Path Traversal in Moment.js
https://notcve.org/view.php?id=CVE-2022-24785
04 Apr 2022 — Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. Moment.js es una librería de fechas en Jav... • https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-27: Path Traversal: 'dir/../../filename' •

CVE-2022-0130
https://notcve.org/view.php?id=CVE-2022-0130
14 Jan 2022 — Tenable.sc versions 5.14.0 through 5.19.1 were found to contain a remote code execution vulnerability which could allow a remote, unauthenticated attacker to execute code under special circumstances. An attacker would first have to stage a specific file type in the web server root of the Tenable.sc host prior to remote exploitation. Se ha detectado que Tenable.sc versiones 5.14.0 a 5.19.1, contienen una vulnerabilidad de ejecución de código remota que podría permitir a un atacante remoto no autenticado ejec... • https://www.tenable.com/security/tns-2022-01 •

CVE-2021-44224 – Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier
https://notcve.org/view.php?id=CVE-2021-44224
20 Dec 2021 — A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). Un URI diseñado que es enviado a httpd configurado como proxy directo (ProxyRequests on) puede causar un fallo (desreferencia de puntero NUL... • http://httpd.apache.org/security/vulnerabilities_24.html • CWE-476: NULL Pointer Dereference CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2021-44790 – Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier
https://notcve.org/view.php?id=CVE-2021-44790
20 Dec 2021 — A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. Un cuerpo de petición cuidadosamente diseñado puede causar un desbordamiento de búfer en el analizador multiparte mod_lua (r:parsebody() llamado desde scripts Lua). El equipo de Apache httpd no presenta const... • https://packetstorm.news/files/id/171631 • CWE-787: Out-of-bounds Write •