Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-4333

Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher’s hardening guidelines.

CVE
#windows#pdf

%PDF-1.4 %���� 1 0 obj << /CreationDate (D:20221205162428+01’00’) /CreatorTool (PDF-XChange Lite \(9.0 build 352\) [GDI] [Windows 10 Professional x64 \(Build 19045\)]) /ModDate (D:20221205162432+01’00’) /Producer (PDF-XChange Lite \(9.0 build 352\) [GDI] [Windows 10 Professional x64 \(Build 19045\)]) >> endobj 2 0 obj << /Metadata 3 0 R /Pages 4 0 R /Type /Catalog >> endobj 3 0 obj << /Length 3083 /Subtype /XML /Type /Metadata >> stream application/pdf uuid:2fb587b1-02aa-43ba-ba46-54baae702ddc uuid:09d1d69f-301e-4e76-a36a-85d70ff9dd81 2022-12-05T16:24:28+01:00 2022-12-05T16:24:32+01:00 PDF-XChange Lite (9.0 build 352) [GDI] [Windows 10 Professional x64 (Build 19045)] PDF-XChange Lite (9.0 build 352) [GDI] [Windows 10 Professional x64 (Build 19045)] endstream endobj 4 0 obj << /Count 3 /Kids [5 0 R 6 0 R 7 0 R] /Type /Pages >> endobj 5 0 obj << /Contents 8 0 R /MediaBox [0 0 595.2 841.92] /Parent 4 0 R /Resources << /Font << /F0 9 0 R /F1 10 0 R /F2 11 0 R >> /XObject << /Im0 12 0 R >> >> /Type /Page >> endobj 6 0 obj << /Contents 13 0 R /MediaBox [0 0 595.2 841.92] /Parent 4 0 R /Resources << /Font << /F0 9 0 R /F1 10 0 R /F2 11 0 R >> /XObject << /Im0 12 0 R >> >> /Type /Page >> endobj 7 0 obj << /Contents 14 0 R /MediaBox [0 0 595.2 841.92] /Parent 4 0 R /Resources << /Font << /F0 9 0 R /F1 10 0 R >> /XObject << /Im0 12 0 R >> >> /Type /Page >> endobj 8 0 obj << /Filter /FlateDecode /Length 2859 >> stream xڝXYs�H~���Gk�n!�eiw�aw{{b�{�(@�B�u������*�l���}��:���`{�E�9��wLׁ�5�3t��������t�!�>*�`�2�/Ef4tCX�E�����eZCXn��M��#B���7cq(E��d��Q¸��}\����s|��~���{�m��������7�6�GƦ�R,��� �mZ�����$�����Ƨ�t��okd’1C3r�z_��Gd�qWƽ��y��w,��_5���!� ��G�}K�/��g9/�=)�2���[�vSե\�����VFZ������s!�/�An�/�5�[|�����I�Gv��[IDx���a�� ��"W:���t��w�o�d`�‹)���iI���N��^�w���S�Q����ר�En�i�(�J7i�3*��i��^^H��bh’h��~v�a&��ty#��$�� `zC�֟7�G0�,+D.��i;B��g�&���C��q�(�d3��-�X��FP’�XA 2� ���MO!�����t>�p?�������|�#w�%\�y:’(��f ��x9�*��� [{��E9<@s���c\����DÎ�|�(���Hȵb�%8d$�qn�Y�UZP ��>*�� �`�b^l%Zw]҇�O�s��v��=޳]�����0x��!I[��ny�gv6}?�U���VL"Zr���V��"��T����M�aDB��%8�*��cZsl��6�0��nD�$C��&��:����Y^&���<,����K��o�Op͍�{�W��WWBxdLeV�y�M��R�nr�y+�1�GP��E&�q�pȼ���#�d�c��K��8�O�i���-�Ҹ#������! ���o6"��Y��i��4�� ��l���� ##/jP�֤����gch=��lzų�{�g��+��3�@�nZ��o(��6[��M��ƫ~d��L��J��y??��5Q6��X0�e=˂�`��� ������3Ff\��K��&M����v�ޝN[|�����݇�v ����usν5�q�m햁β�b>UqX ���DF�^� ���&,w%%���0|��s�t�Bq3^��DjYU� ����PrC�ר����<=4Y�cfE~�g5b�u’?���򞿧[b��a% &c�Ϻ��+��R���b#_��fZIIX

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907