Lista CVE 2023/47xxx

CVE nel gruppo: 47xxx

CVE-2023-47091 (Clicca per dettagli)

CVE-2023-47092 (Clicca per dettagli)

CVE-2023-47093 (Clicca per dettagli)

CVE-2023-47094 (Clicca per dettagli)

CVE-2023-47095 (Clicca per dettagli)

CVE-2023-47096 (Clicca per dettagli)

CVE-2023-47097 (Clicca per dettagli)

CVE-2023-47098 (Clicca per dettagli)

CVE-2023-47099 (Clicca per dettagli)

CVE-2023-47100 (Clicca per dettagli)

CVE-2023-47101 (Clicca per dettagli)

CVE-2023-47102 (Clicca per dettagli)

CVE-2023-47104 (Clicca per dettagli)

CVE-2023-47105 (Clicca per dettagli)

CVE-2023-47106 (Clicca per dettagli)

CVE-2023-47107 (Incorrect processing of fragment in the URL leads to Authorization Bypass in Traefik)

CVE-2023-47108 (PILOS account takeover through password reset poisoning)

CVE-2023-47109 (DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics )

CVE-2023-47110 (PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block)

CVE-2023-47111 (Any value can be changed in the configuration table by an employee having access to block reassurance module )

CVE-2023-47112 (ZITADEL race condition in lockout policy execution)

CVE-2023-47113 (Authenticated users can view job names and groups they do not have authorization to view in Rundeck)

CVE-2023-47114 (DLL Search Order Hijacking vulnerability in BleachBit for Windows)

CVE-2023-47115 (Ethyca Fides HTML Injection Vulnerability in HTML-Formatted DSR Packages)

CVE-2023-47116 (Label Studio XSS Vulnerability on Avatar Upload)

CVE-2023-47117 (Label Studio SSRF on Import Bypassing `SSRF_PROTECTION_ENABLED` Protections)

CVE-2023-47118 (Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio)

CVE-2023-47119 (Heap buffer overflow in T64 codec decompression)

CVE-2023-47120 (HTML injection in oneboxed links)

CVE-2023-47121 (Discourse DoS through Onebox favicon URL)

CVE-2023-47122 (Discourse SSRF vulnerability in Embedding)

CVE-2023-47123 (Gitsign’s Rekor public keys fetched from upstream API instead of local TUF client.)

CVE-2023-47124 (iTop vulnerable to XSS vulnerability in n:n relations “tagset” widget)

CVE-2023-47125 (Denial of service whith ACME HTTPChallenge in Traefik)

CVE-2023-47126 (By-passing Cross-Site Scripting Protection in HTML Sanitizer)

CVE-2023-47127 (Information Disclosure in Install Tool in typo3/cms-install)

CVE-2023-47128 (Weak Authentication in Session Handling in typo3/cms-core)

CVE-2023-47129 (piccolo SQL Injection via named transaction savepoints)

CVE-2023-47130 (Statamic CMS remote code execution via front-end form uploads)

CVE-2023-47131 (Unsafe deserialization of user data in yiisoft/yii)

CVE-2023-47132 (Clicca per dettagli)

CVE-2023-47140 (Clicca per dettagli)

CVE-2023-47141 (IBM CICS Transaction Gateway improper access controls)

CVE-2023-47142 (IBM Db2 denial of service)

CVE-2023-47143 (IBM Tivoli Application Dependency Discovery Manager privilege escalation)

CVE-2023-47144 (IBM Tivoli Application Dependency Discovery Manager HOST header injection)

CVE-2023-47145 (IBM Tivoli Application Dependency Discovery Manager cross-site scripting)

CVE-2023-47146 (IBM Db2 for Windows privilege escalation)

CVE-2023-47147 (IBM QRadar SIEM information disclosure)

CVE-2023-47148 (IBM Secure Proxy file manipulation)

CVE-2023-47150 (IBM Storage Protect Plus Server information disclosure)

CVE-2023-47152 (IBM Common Cryptographic Architecture denial of service)

CVE-2023-47158 (IBM Db2 information disclosure)

CVE-2023-47159 (IBM Db2 denial of service)

CVE-2023-47160 (IBM Sterling File Gateway information disclosure)

CVE-2023-47161 (IBM Cognos Controller XML external entity injection)

CVE-2023-47162 (IBM UrbanCode Deploy denial of service)

CVE-2023-47163 (IBM Secure Proxy cross-site scripting)

CVE-2023-47164 (Clicca per dettagli)

CVE-2023-47165 (Clicca per dettagli)

CVE-2023-47166 (Clicca per dettagli)

CVE-2023-47167 (Clicca per dettagli)

CVE-2023-47168 (Clicca per dettagli)

CVE-2023-47169 (Open redirect in /oauth//mobile_login?redirect_to=)

CVE-2023-47170 (Clicca per dettagli)

CVE-2023-47171 (Clicca per dettagli)

CVE-2023-47172 (Clicca per dettagli)

CVE-2023-47174 (Clicca per dettagli)

CVE-2023-47175 (Clicca per dettagli)

CVE-2023-47177 (Clicca per dettagli)

CVE-2023-47178 (WordPress Linker Plugin <= 1.2.1 is vulnerable to Cross Site Scripting (XSS))

CVE-2023-47179 (WordPress The Plus Addons for Elementor Pro plugin <= 5.2.8 - Unauthenticated Local File Inclusion vulnerability)

CVE-2023-47180 (WordPress WooODT Lite plugin <= 2.4.6 - Arbitrary Site Option Update vulnerability)

CVE-2023-47181 (WordPress Finale Lite – Sales Countdown Timer & Discount for WooCommerce plugin <= 2.16.0 - Arbitrary Content Deletion vulnerability)

CVE-2023-47182 (WordPress IdeaPush Plugin <= 8.52 is vulnerable to Cross Site Scripting (XSS))

CVE-2023-47183 (WordPress Login Screen Manager Plugin <= 3.5.2 is vulnerable to Cross Site Scripting (XSS))

CVE-2023-47184 (WordPress GiveWP plugin <= 2.33.1 - Broken Access Control vulnerability)

CVE-2023-47185 (WordPress Admin Bar & Dashboard Access Control Plugin <= 1.2.8 is vulnerable to Cross Site Scripting (XSS))

CVE-2023-47186 (WordPress wpDiscuz Plugin <= 7.6.11 is vulnerable to Cross Site Scripting (XSS))

CVE-2023-47187 (WordPress Kadence WooCommerce Email Designer Plugin <= 1.5.11 is vulnerable to Cross Site Request Forgery (CSRF))