Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-15785

A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.

CVE
#vulnerability#windows#pdf#auth

%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 630.026 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 433.119 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 352.019 null] >> endobj 6 0 obj << /D [7 0 R /XYZ 85.039 630.044 null] >> endobj 8 0 obj << /D [7 0 R /XYZ 70.866 442.607 null] >> endobj 9 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 10 0 R /Type /Page /Resources 11 0 R /Parent 12 0 R /Annots [13 0 R 14 0 R 15 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 13 0 obj << /A << /S /URI /Type /Action /URI (https://support.industry.siemens.com/cs/ww/en/view/109781490/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 458.519 518.276 469.936] >> endobj 15 0 obj << /A << /S /URI /Type /Action /URI (https://www.first.org/cvss/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [131.954 112.007 248.203 123.543] >> endobj 16 0 obj << /A << /S /URI /Type /Action /URI (https://cwe.mitre.org/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [69.87 721.983 163.926 733.519] >> endobj 11 0 obj << /ProcSet [/PDF /Text] /Font << /F53 17 0 R /F50 18 0 R >> >> endobj 10 0 obj << /Filter /FlateDecode /Length 3071 >> stream xڵZ]W�8}�W�m�sc}�R�14��,t�zϜ�y0��v>�v`{�ޒ�`’N�f�c�R�J*ݺU"=���磟’G’�T42��y<�<��(�q

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda