Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-31619

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions < V13.1.0.9), Teamcenter V13.2 (All versions), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions). Java EE Server Manager HTML Adaptor in Teamcenter consists of default hardcoded credentials. Access to the application allows a user to perform a series of actions that could potentially lead to remote code execution with elevated permissions.

CVE
#vulnerability#java#rce#pdf

%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 646.963 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 586.883 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 205.561 null] >> endobj 6 0 obj << /D [7 0 R /XYZ 70.866 758.964 null] >> endobj 8 0 obj << /D [7 0 R /XYZ 85.039 326.658 null] >> endobj 9 0 obj << /D [10 0 R /XYZ 70.866 649.338 null] >> endobj 11 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 12 0 R /Type /Page /Resources 13 0 R /Parent 14 0 R /Annots [15 0 R 16 0 R 17 0 R 18 0 R 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R 24 0 R 25 0 R 26 0 R 27 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 15 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 487.411 446.757 498.828] >> endobj 16 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 462.011 433.497 474.688] >> endobj 17 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 433.415 446.757 444.832] >> endobj 18 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 408.016 433.497 420.693] >> endobj 19 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 379.42 446.757 390.837] >> endobj 20 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 354.02 433.497 366.697] >> endobj 21 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [458.38 327.317 518.276 336.841] >> endobj 23 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 283.384 446.757 294.801] >> endobj 24 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 257.984 433.497 270.662] >> endobj 25 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [458.38 231.281 518.276 240.806] >> endobj 27 0 obj << /A << /S /GoTo /D (section*.2) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [386.143 67.653 524.579 79.19] >> endobj 28 0 obj << /A << /S /GoTo /D (section*.4) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [147.498 757.968 309.548 769.385] >> endobj 13 0 obj << /ProcSet [/PDF /Text] /Font << /F49 29 0 R /F46 30 0 R >> >> endobj 12 0 obj << /Filter /FlateDecode /Length 2577 >> stream x��Z�s۸�_��R3��L_|�s�k�����Nr�Dۚ�EU�����.*�D�R)�7�$,v��]K���&?��4>{�Z����NƷ���j��b&O�O�h�?�r0�Ʀ�|�^ �L���?��|�uV�(h�� ��5�ê��’����z���=����C4a�P��L�>�N�)��kB�p6��{>$R ����y2:���B��M�(M���hZI���A?.a�8iLSA��mT��|�9Uֽ��)E?drI,������BB���Gb�ٶ�d+\�i���b_)L�f��/���e�I����4��� CDι���� Gb���9�n�r^��z^u�n Q\���Nڃ�N[����=3�o�}�O�E5���4{ 4#Z$�D�B��Y�%�ǁ��z��Wٗ�ڎRJ�����C��T�8�����r��C ����’| c�{�+� ԰6�c\�<{���+/Ķ� PC�8_� ��E��a�#�|6ɪY���UV�/!*Y�SN9R=d’�C�L���Us���Q�0��(��Z�a�ǁIV%��%�,����q4 �� ���OY��p9)VȀ�*�;#$�BK�F�[X6%�K��ʹ�J�������@���8���A&��Z���B<4s!lz�����yNC���8��p���>��L�|cu�U��3���ؿ��e�Id�I��G��ѴF�����Ч*"? O �k�!��A��*ջ��� �u�U�d���D���L���2��ɚJ�[��|R�~��Eg� � ����2

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907