Lista CVE - 2023 / Gennaio
Visualizzazione 1901 - 2000 di 2351 CVE per Gennaio 2023 (Pagina 20 di 24)
| ID CVE | Data | Titolo |
|---|---|---|
| CVE-2022-25882 | 2023-01-25 | Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside... |
| CVE-2022-25894 | 2023-01-25 | All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation. |
| CVE-2022-21810 | 2023-01-25 | All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. |
| CVE-2022-25962 | 2023-01-25 | All versions of the package vagrant.js are vulnerable to Command Injection via the boxAdd function due to improper input sanitization. |
| CVE-2023-23611 | 2023-01-25 | xblock-lti-consumer contain Missing Authorization in Grade Pass Back Implementation |
| CVE-2023-23610 | 2023-01-25 | glpi vulnerable to Unauthorized access to data export |
| CVE-2023-22725 | 2023-01-25 | glpi vulnerable to XSS on external links |
| CVE-2023-22724 | 2023-01-25 | glpi contains XSS in RSS Description Link |
| CVE-2023-22722 | 2023-01-25 | glpi subject to Cross-site Scripting (XSS) - Reflected |
| CVE-2023-22500 | 2023-01-25 | glpi Unauthorized access to inventory files |
| CVE-2022-41941 | 2023-01-25 | glpi contains XSS Stored inside Standard Interface Help Link href attribute |
| CVE-2023-23609 | 2023-01-25 | contiki-ng BLE-L2CAP contains Improper size validation of L2CAP frames |
| CVE-2022-4510 | 2023-01-25 | Path Traversal in binwalk |
| CVE-2022-34405 | 2023-01-25 | An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the... |
| CVE-2022-43917 | 2023-01-25 | IBM WebSphere Application Server information disclosure |
| CVE-2022-43864 | 2023-01-25 | IBM Business Automation Workflow information disclosure |
| CVE-2023-22482 | 2023-01-25 | JWT audience claim is not verified |
| CVE-2022-22462 | 2023-01-25 | IBM Security Verify Governance, Identity Manager virtual appliance component information disclosure |
| CVE-2022-3094 | 2023-01-25 | An UPDATE message flood may cause named to exhaust all available memory |
| CVE-2022-3488 | 2023-01-25 | named may terminate unexpectedly when processing ECS options in repeated responses to iterative queries |
| CVE-2022-3736 | 2023-01-25 | named configured to answer from stale cache may terminate unexpectedly while processing RRSIG queries |
| CVE-2022-3924 | 2023-01-25 | named configured to answer from stale cache may terminate unexpectedly at recursive-clients soft quota |
| CVE-2021-36539 | 2023-01-26 | Instructure Canvas LMS didn't properly deny access to locked/unpublished files when the unprivileged user access the DocViewer based file preview URL (canvadoc_session_url). |
| CVE-2022-42330 | 2023-01-26 | Guests can cause Xenstore crash via soft reset When a guest issues a "Soft Reset" (e.g. for performing a kexec) the libxl based Xen toolstack will normally perform a XS_RELEASE... |
| CVE-2022-46966 | 2023-01-26 | Revenue Collection System v1.0 was discovered to contain a SQL injection vulnerability at step1.php. |
| CVE-2020-22327 | 2023-01-26 | An issue was discovered in HFish 0.5.1. When a payload is inserted where the name is entered, XSS code is triggered when the administrator views the information. |
| CVE-2020-22452 | 2023-01-26 | SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.2.0 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php. |
| CVE-2021-36686 | 2023-01-26 | Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page. |
| CVE-2021-41988 | 2023-01-26 | Qlik NPrinting Designer through 21.14.3.0 creates a Temporary File in a Directory with Insecure Permissions. |
| CVE-2021-41989 | 2023-01-26 | Qlik QlikView through 12.60.20100.0 creates a Temporary File in a Directory with Insecure Permissions. |
| CVE-2022-40717 | 2023-01-26 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the anweb... |
| CVE-2022-40718 | 2023-01-26 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the anweb... |
| CVE-2022-40719 | 2023-01-26 | This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within... |
| CVE-2022-40720 | 2023-01-26 | This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within... |
| CVE-2022-41140 | 2023-01-26 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the... |
| CVE-2022-41141 | 2023-01-26 | This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order... |
| CVE-2022-41142 | 2023-01-26 | This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of requests to... |
| CVE-2022-41143 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41144 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41145 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41146 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41147 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41148 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41149 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41150 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41151 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41152 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-41153 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42369 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42370 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42371 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42372 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42373 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42374 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42375 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42376 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42377 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42378 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42379 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42380 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42381 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42382 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42383 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42384 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42385 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42386 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42387 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42388 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42389 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42390 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42391 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42392 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42393 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42394 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42395 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42396 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42397 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42398 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42399 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42400 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42401 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42402 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42403 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42404 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42405 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42406 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42407 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42408 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42409 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42410 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42411 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42412 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42413 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42414 | 2023-01-26 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42415 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42416 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42417 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42418 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42419 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |
| CVE-2022-42420 | 2023-01-26 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a... |