Headline
CVE-2023-22324
SQL injection vulnerability in the CONPROSYS HMI System (CHS) Ver.3.5.0 and earlier allows a remote authenticated attacker to execute an arbitrary SQL command. As a result, information stored in the database may be obtained.
%PDF-1.7 %���� 75 0 obj <> endobj 100 0 obj <>/Encrypt 76 0 R/Filter/FlateDecode/ID[<4F54C20543CA154FA285B97CE6545091><91F2217956FBE340806248B215D60CE9>]/Index[75 41]/Info 74 0 R/Length 111/Prev 246323/Root 77 0 R/Size 116/Type/XRef/W[1 3 1]>>stream h�bbd```b``�L�A$�ɨ&�A$�"��2��o`���L��E ��"L`6�1$q5��� ��d\ ��bG���ɿ ;��n�V��H5�?Ӊ��Rn endstream endobj startxref 0 %%EOF 115 0 obj <>stream V��>;��V��c��6��(}P��BPp��_�DA�}���~�P��q��Η�φlr�]n2��h�x,K����؉����a��RF�A�C��?`�PC�M��R!1�h�PO�����(:w��.��=���S������w����5��?*��(�}�W�j endstream endobj 76 0 obj <>>>/Filter/Standard/Length 256/O(�p0c̹s��\(�{#:\(3���oTl�&���@���4�,�.쉍���Av)/OE(�m�~���4��X�&�bÑ�\(�R5I#\(%�C�)/P -1324/Perms(>v�����.�����J)/R 6/StmF/StdCF/StrF/StdCF/U(�#�}ᣚ���z�F��k�F`>Z\r�!Wj>��౭�v������S��)/UE(�q^ռ����zU\n�o���b�Х���)/V 5>> endobj 77 0 obj <>/Metadata 5 0 R/OpenAction 78 0 R/PageLayout/SinglePage/Pages 73 0 R/StructTreeRoot 10 0 R/Type/Catalog>> endobj 78 0 obj <> endobj 79 0 obj <>/ProcSet[/PDF/Text]>>/Rotate 0/StructParents 0/Type/Page>> endobj 80 0 obj <>stream =��Fʤ��\���W�=�w�j�ܞ$��{π�"��� 3�z`��5wV����>�&�e���P��X�Ȯ��)V�8��Dh�)�t�����և~`I"���h�?t�l�H.�_��p���>1�":*0Yp(�v}ڿ%����ʢ�Hx�Mh���2���r���,��z��҈�,�c���|��@�Z�U�eB�g%��gu/����ֆ�’n�$����!w���T_� ���!J�CyN�a|�rd�V\ r-Zc9��h��6���c�qs�`�"3�g�:� �X�q�^��_dU���~"��8���e�#�S�m’q�R�ŠFIl��yN,�6M�))��(z�����Z]YG���8��^���(����_Mv49�AF�D)���䚖�7��ڵ�F�G�ғ�+��gJ�.�ßs�@T,�Th���<ͬ�1��Բ4�� �#��zV!�`�4 ��lB2J����>�!�:mڟC�4���a~0e+o�3�G�R�&���J�V�A��{\�S��5]b8����0�j}D(40�,�5�d0�I�P�&�Gw7Ȭ UOT}��+�2��?&*n��’���Ȫ�2����`@� ���ե[fXs�ܾ�o~��l�g���jm��<͆3-�Q��I�~�z�L7��XYFQ?�8�XVC�~�u�ו�v�N� � �2���U?�����4�1Ǝ_�>�K�����7�imk��n�h��9�X�F�f&�p�R�:�*��R�K�*Kyu��~�,u��)�|���Y��Lu���6��/�’���:� ���1 իT�B]#����Y���� M�K��8�m�A��b�$A�