Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-30231

A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash.

CVE
#vulnerability#intel#pdf#auth

%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 630.026 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 569.947 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 223.312 null] >> endobj 6 0 obj << /D [2 0 R /XYZ 70.866 116.408 null] >> endobj 7 0 obj << /D [8 0 R /XYZ 85.039 481.353 null] >> endobj 9 0 obj << /D [8 0 R /XYZ 70.866 208.938 null] >> endobj 10 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 11 0 R /Type /Page /Resources 12 0 R /Parent 13 0 R /Annots [14 0 R 15 0 R 16 0 R 17 0 R 18 0 R 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R 24 0 R 25 0 R 26 0 R 27 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 14 0 obj << /A << /S /URI /Type /Action /URI (https://support.industry.siemens.com/cs/ww/en/view/109780559/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 470.474 518.276 481.891] >> endobj 16 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 433.119 433.497 445.797] >> endobj 17 0 obj << /A << /S /URI /Type /Action /URI (https://support.industry.siemens.com/cs/ww/en/view/109780559/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 404.524 518.276 415.941] >> endobj 19 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 367.169 433.497 379.846] >> endobj 20 0 obj << /A << /S /URI /Type /Action /URI (https://support.industry.siemens.com/cs/ww/en/view/109780559/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 338.573 518.276 349.99] >> endobj 22 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 301.218 433.497 313.895] >> endobj 23 0 obj << /A << /S /URI /Type /Action /URI (https://support.industry.siemens.com/cs/ww/en/view/109780559/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 272.622 518.276 284.039] >> endobj 25 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 235.267 433.497 247.945] >> endobj 26 0 obj << /A << /S /GoTo /D (section*.2) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [386.143 133.225 524.579 144.762] >> endobj 27 0 obj << /A << /S /GoTo /D (section*.4) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [147.498 115.412 309.548 126.829] >> endobj 12 0 obj << /ProcSet [/PDF /Text] /Font << /F49 28 0 R /F46 29 0 R >> >> endobj 11 0 obj << /Filter /FlateDecode /Length 2404 >> stream x��ZKs�8��W�HU� �A�����g��kə�J�P������ʿ�ƃ IѴ��]sHL�@������8� ppq���d���@#-� ��@aI(�� *�΃o�$MV�: ���I����0-~����!�7��p�~ ���6�:��wqqz~3�������OΧ’�=!��/R����۟8�û�����G�sp��� ������’�U���4�)!�h�̈#��^��C�+Uu�Ј��;h2JF� “B B��\ ��~��Qlj`гS#�[}*\�E�]&��SB������x���H�c$P�8]�S�!u��0&?Zt�E���\��%�#̢N�FX5"’1����{��f�EQ/���~G���Џ� a�5B��@�p�\’��G�L�4�-a� �IK���&d�i�uK����G�a�GqH6��! 5;7�׍ �<_��.��W�pIG���XժSw�u#|.�t~>��I��V��L���B>��ӯnN� v��,��Y�&n֏Fe�����0�^�l�[��H7kW��fE��`�iH1�C,���f8�$� �4� 7�v;w��"�Q��,K�~��A>�r�Fs��+A�u���� z��~��/��&3 ()B����e��Н� !>[ �2����dPq�0n���7����ɛ�`�� �AM����kH% , �~�}�hڒ�wK����;�4�����[�’�?��1���2��w�E���A�xa ]�逄&�mζ�J���i|_N/ws�,!mX�a)� YkWi��kH@�p����\-�ŀ�а1�!.�tY����K�n�[�fX>��062�Y��ˎ���p�%ܥ^~��]’�S~?��N�}᛼x��z�̫�A�K:�fq��(�7��T�����>��(œ;9������>0Pl�@��]�Φ��0�|?���p���I\�����z��$ۜ%�f3ν8��~׹l�K_�� ���V^�z2��²3#�);"��-2����O��g-h$�3[,�!G)5B ҥ��DC���_�nO�� ,��g0��1”(G@S;MaR��|n�=����Q�Rf�9&p�[cޥ������˧����-1k���D(�{9�em/Gi���d�j��]"�s2d��Ã�?dwA�妶��V�ƴSj���%���W-}\ـ+���A�� 2����F�x�`�YV L�3(��e[ah|������ɾ� ���������( JP��xvܜ�W��}e@���i�� ��䭲�*�p1�#™�����rʷg/���<�]v=�7W��;X^��("�zy�S@R�\�x�0 �#���Fү�F����:�/���V�m���~ �H��|k쿆C��ܻѨx[�� ��J�gK2௩�ف1^q��q�}0Ψ��~V�lTY���6�0�����@�z��T ��ρ�B�{^ �����|��8J֣��z��~ ���&qGka!����V�FRx�>I�+’@;A%� �\˞>�<_T��f�^�I\t������g u��aN=��k�mv��U� ���ɸ)!��qs �� Rz�Ha�Y�׆X�hR`SЄ�T!z\��d��< *6�B�Q��]P�5|�O�ғ�*X��z;T1�xR��UX���U�2�7B����"0 '��J_U0��eTa0�� T��U�� �xL�{���l� wi��1�q�`c_O�C��f�� �ݧP��w�ƁOH���B5R������}� ��}lyq����&=�cKO�-�MCT�6���K��(� �c�i�`�����5�b�iA�8P�vt�ty ߖI��転 U��ۡ ��Q��PA ��;� eE�m���as ԜK�~��O�;X��.L:?8�Ə8X��\���s2}�;���|�vB-1��1J

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907