Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-5274

Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running.

CVE
#vulnerability#dos#pdf

%PDF-1.7 %���� 83 0 obj <> endobj 102 0 obj <>/Encrypt 84 0 R/Filter/FlateDecode/ID[<776DE55659435E4F89CA5894BB8A9F61><6F6589E2F5825249A248B30EE43FE1A5>]/Index[83 28]/Info 82 0 R/Length 96/Prev 109535/Root 85 0 R/Size 111/Type/XRef/W[1 3 1]>>stream h�bbd```b``�&��H�5`RD2����A$�9X� ���#�,���7) 6� H2�4�j� �@��0��� �*��u� ��A endstream endobj startxref 0 %%EOF 110 0 obj <>stream �Q��8r�� yS��a�eօ��H� ^��u��6�7�vD�’A���% ��S[LR���5�MQ� P�ԗ���������g��� ���p\�z��ƛ���on#�8�^8 endstream endobj 84 0 obj <>>>/Filter/Standard/Length 256/O(��A������7W�\n!�J�#O�.pP� ��Yw��z��I���t�)/OE(|�,�0R%\(B�ô�����aS26\)�ٹ ���})/P -1324/Perms(�\)ɐr��8\\o��.�)/R 6/StmF/StdCF/StrF/StdCF/U(� �7RvW�"���X��4Y�"-.�R\)��Ҝ>�L�0Ἴ!Y��\n)/UE(���|�d��#�1A+��H��\\F�@Q���,�’)/V 5>> endobj 85 0 obj <>/Metadata 2 0 R/PageLayout/OneColumn/Pages 81 0 R/StructTreeRoot 6 0 R/Type/Catalog/ViewerPreferences<>>> endobj 86 0 obj <>/ProcSet[/PDF/Text]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 87 0 obj <>stream ��J�Tz��_����d��2,G��3�t� �|B�T 2�q�g�e��0Q ��qM���/{ X�u 6|�5?�c(�E0å.���g�W����$�<�_:�&Aqta��qo���-�,�y���cP�\Kp�m�kғp�� �9%���L-Ӗ��m�K�n�\�[TVW�rʛ�u�M�NY�kz���,���Y6�FC#���o�F%Ui�x1 �$G}�P�<�u�R2+���:�gu}�Khj���’"���"�$J�fn�Z Iq����n�� %���A&n�\⥦����̨p���� ���1�YDb_d�7�ۧ�����h��6����S#;^N���ߥ�$�i��CH� b i�)XO� �2� x6\��_��t9��t��4DJ����YY�[��� ��(�K�y�{T.�z�k�;�y�T%�� �}�y�� ��`7��3P2��D�uMͲf�V�:�T ���D��Xw&��2��5� Y����?�� Q,G�t6I�Tj�� Wj����r�]]�W,�k�>�(�Cj ���Q��³Ш5�Œ~�+�3%i�eK"��`�TuI�Gl��+�_ ��q��=���(�P�$͆� �aQQF���y���% �%�����r����(��:� endstream endobj 88 0 obj <>stream RV�XelJL���sn3�[ ��i4�W�˪�<:b��a�9c��+�?�һυI{`�QF$kҼ����qTm� �$(�vu�>x��~��j��N&W���Kt�n�(�=�ѧJ����X~E��� �cȖ�(V_������m���硫ߋ� w&u�>æ2��í�1e�{�*E�W :����!��d�g�L��iv�G���#TL��x8�H} mIlRG�51m���z8��9�J�D#��������v���.�-m�T�֤8CS��E^vHD�u��m&za���[����ǃ��?�8v���>>]�L_�*I�pNl����)��O;�;ũ�ge���?2�.�0��"�*4���$�]�<�h7�F�Q��,�o�+955��KUj�Y�ڔ���gs|=|�^Z��:������� K⒮QN��b7��s�)���Z���;��2�J|�t��;���UЅ�Z��󷠃H(��~^�D�y�245gƟt|��2��:���R�����Y4%GsWh���*%�������%g_������#$�ϼ��%� �zM]��_�@`R��G��AYxo8�"�S���ag��lt�#Fh�"����$c��w=�J��4�=�o~,aXM�R �Tzx�Dk�Z�:0��П9��$�k�SB’% i���U򓏘�v�’�a�@�2\�M���s�M�]��#����� G���� ��M�ijk��Z�۶��q’6֒���� �]�0}VvN"��h\��|����;*����Զ(�0X`q9�̢��]�WN�wk �M@�k��n^t�`�|�.�+(9���� � ,��[R�Ebd�3�����Z�������nll38�7���oF� ��A|r�ݡ��%� k<���d� �۰��h��T�z�K�U�H���i��!,G�\�W���9’K����g.�qŕDܳC�%R���p�n8�� �FDg�u����͇ԈX�e������[�ʆ D��.t��P3��=?��F���S &�֪�j�nR)��f�R!�8TW" w�+��5z<=:}Km

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907