Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ CVE-2023-26472 | XWiki Platform prior 13.10.10/14.4.6/14.9 escape output (GHSA-vwr6-qp4q-2wj7)

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2023-26472 | XWiki Platform prior 13.10.10/14.4.6/14.9 escape output (GHSA-vwr6-qp4q-2wj7)


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability, which was classified as critical, has been found in XWiki Platform. This issue affects some unknown processing. The manipulation leads to escaping of output. The identification of this vulnerability is CVE-2023-26472. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component. ...



๐Ÿ“Œ CVE-2024-21648 | XWiki xwiki-platform/xwiki-platform-oldcore Rollback Action insufficient privileges


๐Ÿ“ˆ 72.08 Punkte

๐Ÿ“Œ CVE-2024-21651 | XWiki xwiki-platform-distribution-war Attachment denial of service (GHSA-8959-rfxh-r4j4)


๐Ÿ“ˆ 56.17 Punkte

๐Ÿ“Œ CVE-2024-21650 | XWiki xwiki-platform up to 14.10.16/15.5.2/15.7 User Registration first name/last name neutralization of directives


๐Ÿ“ˆ 46.32 Punkte

๐Ÿ“Œ CVE-2022-36100 | XWiki Platform Applications Tag prior 13.10.6/14.4 code injection (GHSA-2g5c-228j-p52x)


๐Ÿ“ˆ 43.33 Punkte

๐Ÿ“Œ CVE-2022-36093 | XWiki Platform Web Templates prior 13.10.5/14.3RC1 Email Verification authentication bypass (GHSA-h5j3-5x63-p8jv)


๐Ÿ“ˆ 43.33 Punkte

๐Ÿ“Œ CVE-2022-36098 | XWiki Platform Mentions UI prior 13.10.6/14.4 Script cross site scripting (GHSA-c5v8-2q4r-5w9v)


๐Ÿ“ˆ 43.33 Punkte

๐Ÿ“Œ CVE-2022-41937 | XWiki Platform prior 13.10.8/14.6/14.6RC1 XAR Package authorization (GHSA-q6jp-gcww-8v2j)


๐Ÿ“ˆ 43.33 Punkte

๐Ÿ“Œ go-ipfs up to 0.7.x Console Output escape output


๐Ÿ“ˆ 39.96 Punkte

๐Ÿ“Œ Medium CVE-2020-15171: Xwiki Xwiki


๐Ÿ“ˆ 39.91 Punkte

๐Ÿ“Œ Medium CVE-2021-21380: Xwiki Xwiki


๐Ÿ“ˆ 39.91 Punkte

๐Ÿ“Œ CVE-2022-46663 | GNU Less up to 608 ANSI Escape escape output


๐Ÿ“ˆ 39.63 Punkte

๐Ÿ“Œ CVE-2022-31166 | XWiki Platform Old Core XWikiRights Resolution privileges management (GHSA-g4h6-qp44-wqvx)


๐Ÿ“ˆ 36.81 Punkte

๐Ÿ“Œ CVE-2022-31167 | XWiki Platform up to 12.10.10/13.4.5/13.10.0 Security Parent POM improper authorization (GHSA-gg53-wf5x-r3r6)


๐Ÿ“ˆ 36.81 Punkte

๐Ÿ“Œ CVE-2022-36096 | XWiki Platform Index UI up to 13.10.5/14.2 Attachment cross site scripting (GHSA-gjmq-x5x7-wc36)


๐Ÿ“ˆ 36.81 Punkte

๐Ÿ“Œ CVE-2022-41932 | XWiki Platform Old Core Login Form resource consumption (GHSA-4x5r-6v26-7j4v)


๐Ÿ“ˆ 36.81 Punkte

๐Ÿ“Œ CVE-2022-41936 | XWiki Platform up to 13.10.7/14.4.2/14.5 REST Endpoint unknown vulnerability (GHSA-p88w-fhxw-xvcc)


๐Ÿ“ˆ 36.81 Punkte

๐Ÿ“Œ Gallagher Command Centre Server prior 8.20.1259/8.30.1359/8.40.1888 Configuration escape output


๐Ÿ“ˆ 32.66 Punkte

๐Ÿ“Œ CVE-2022-39387 | XWiki up to 1.29.0 Request Parameter improper authentication (GHSA-m7gv-v8xx-v47w)


๐Ÿ“ˆ 30.4 Punkte

๐Ÿ“Œ PHP: The first rule of the output buffering is you do not talk about the output buffering


๐Ÿ“ˆ 27.65 Punkte

๐Ÿ“Œ McAfee Web Gateway up to 9.2.0 escape output [CVE-2020-7292]


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ fastify-http-proxy up to 4.3.0 on npm escape output [CVE-2021-21322]


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-23079 | motor-admin up to 0.2.56 Password Reset escape output


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-34911 | MediaWiki up to 1.35.6/1.37.2/1.38.0 Welcome successfulAction username escape output


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2020-28455 | markdown-it-toc escape output (SNYK-JS-MARKDOWNITTOC-1044067)


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2020-36599 | OmniAuth up to 1.x failure_endpoint.rb message_key escape output


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-31743 | Mozilla Firefox up to 100 HTML Comment escape output (Bug 1747388)


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-31739 | Mozilla Firefox up to 100 on Windows Download escape output (Bug 1765049)


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-31739 | Mozilla Thunderbird up to 91.9 on Windows Download escape output (Bug 1765049)


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-41322 | Kitty up to 0.26.1 Notification Popup escape output


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2018-25095 | Duplicator Plugin up to 1.2.x on WordPress Configuration File escape output


๐Ÿ“ˆ 27.32 Punkte

๐Ÿ“Œ CVE-2022-41931 | XWiki Platform Icon UI neutralization


๐Ÿ“ˆ 26.95 Punkte

๐Ÿ“Œ CVE-2022-41933 | XWiki Platform cleartext storage


๐Ÿ“ˆ 26.95 Punkte

๐Ÿ“Œ CVE-2022-41934 | XWiki Platform Menu UI neutralization


๐Ÿ“ˆ 26.95 Punkte

๐Ÿ“Œ CVE-2022-41935 | XWiki Platform Livetable UI information disclosure


๐Ÿ“ˆ 26.95 Punkte











matomo