CVE-2023-24508 CVSS:0.0
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24495 CVSS:0.0
A Server Side Request Forgery (SSRF) vulnerability exists in Tenable.sc due to improper validation of session & user-accessible input data. A privileged, authenticated remote attacker could interact with external and internal services covertly. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24494 CVSS:0.0
A stored cross-site scripting (XSS) vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24493 CVSS:0.0
A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24459 CVSS:0.0
A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24458 CVSS:0.0
A cross-site request forgery (CSRF) vulnerability in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified URL. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24457 CVSS:0.0
A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24456 CVSS:0.0
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24455 CVSS:0.0
Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. (Last Update:2023-01-26) (Publish Update:2023-01-26)
CVE-2023-24454 CVSS:0.0
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. (Last Update:2023-01-26) (Publish Update:2023-01-26)
Click here for a complete list of security vulnerabilities. This vulnerability list widget is provided by www.cvedetails.com