Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-37952

A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim’s browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater.

CVE
#xss#vulnerability#js#pdf

%PDF-1.7 %���� 79 0 obj <> endobj xref 79 44 0000000016 00000 n 0000001648 00000 n 0000001794 00000 n 0000001836 00000 n 0000002248 00000 n 0000002507 00000 n 0000002672 00000 n 0000002984 00000 n 0000003157 00000 n 0000003393 00000 n 0000003717 00000 n 0000003970 00000 n 0000004021 00000 n 0000004072 00000 n 0000004239 00000 n 0000004816 00000 n 0000005466 00000 n 0000006277 00000 n 0000006414 00000 n 0000006436 00000 n 0000006658 00000 n 0000006953 00000 n 0000006980 00000 n 0000007105 00000 n 0000007265 00000 n 0000007935 00000 n 0000008564 00000 n 0000009361 00000 n 0000010171 00000 n 0000010931 00000 n 0000011160 00000 n 0000011194 00000 n 0000011349 00000 n 0000017467 00000 n 0000017537 00000 n 0000047173 00000 n 0000102203 00000 n 0000102273 00000 n 0000102527 00000 n 0000102866 00000 n 0000103033 00000 n 0000103060 00000 n 0000001478 00000 n 0000001176 00000 n trailer <<38D43D8DEAB4B2110A00F021DC6DFD7F>]/Prev 120019/XRefStm 1478>> startxref 0 %%EOF 122 0 obj <>stream h�b```�+ l �@(������ð��?z��5��,l�  TyYz�^�D���آ��d����2��6��\�@�c`alcx��Ϩ�0����sY �Ȥ�T�,�P Tu��t�.��xfvf�G �xZ�/0��������-�DV�(�)3�n�``ܦ�X�if� @7�%U�c@��+� endstream endobj 121 0 obj <>/Filter/FlateDecode/Index[12 67]/Length 22/Size 79/Type/XRef/W[1 1 1]>>stream h�bb�``b``� �th� endstream endobj 80 0 obj <>/Metadata 10 0 R/Pages 9 0 R/StructTreeRoot 12 0 R/Type/Catalog/ViewerPreferences 81 0 R>> endobj 81 0 obj <> endobj 82 0 obj <>/MediaBox[0 0 612 792]/Parent 9 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 83 0 obj <>/BS<>/F 4/Rect[69.75 508.42 88.154 530.07]/StructParent 1/Subtype/Link>> endobj 84 0 obj <>/BS<>/F 4/Rect[300.75 161.06 463.91 182.72]/StructParent 2/Subtype/Link>> endobj 85 0 obj [226 0 0 0 0 0 0 221 303 303 0 0 0 306 252 0 507 0 507 507 0 507 0 507 0 507 268 0 0 0 0 0 0 579 0 533 615 488 0 631 623 252 0 0 0 855 646 0 517 0 543 459 487 0 567 890 519 0 0 0 0 0 0 0 0 479 525 423 525 498 305 471 525 230 239 455 230 799 525 527 525 0 349 391 335 525 452 715 0 453 395 0 460] endobj 86 0 obj <> endobj 87 0 obj <> endobj 88 0 obj [215 0 0 0 0 0 0 188 316 316 0 0 200 340 200 350 532 532 532 532 0 532 532 532 532 532 212 0 532 532 532 0 0 609 0 597 645 527 502 660 668 244 0 0 0 0 0 694 545 0 567 522 500 636 587 936 567 0 0 0 0 0 0 0 0 505 535 452 535 508 295 483 539 232 0 479 232 826 539 530 535 0 354 445 355 533 459 738 458 459 438] endobj 89 0 obj <> endobj 90 0 obj <> endobj 91 0 obj <> endobj 92 0 obj <> endobj 93 0 obj <>stream H�ĕmk�@�� ~�y��}r����\Z\��B��;�*MܫnZ��gWIC�Z�����p~;�3��ڔ{�5pvO�Q�/�n�\7q~:�Z�J�RWq��ٸ��B���f�9|�=���RB��V����n�A�{���� $A��|�{��a )”���{��$�A*$`Ĺ�R�PZy�#_�|�6X-!�@����6�G�{ [��lF�%Q͈(�2$�@�u�@;�Gd��g ӈ�aX ��N9�l G��#l�Ҝ`F�`��lt}�hy�/� Lj<��ay�N���C�3>f�}�?A.�6�� y���� ��������@ݎ�!�84l�R<M{n ^�s5���c��#)E�?5 #��g%M���j׀7�v`��א�q���M��=�*ˇ����) b��ј(��$�&%E�p�kW�bF<(���m �0��ePVP:�t%n�Ht���c[aU9ʽt凅��js�s� ���:t_�< 0xy�` endstream endobj 94 0 obj <>stream H�̕�o�0��#��G��vlK�� �Ti-�:i���C �%���������a9��|���l’{G�,����.�����J��m�5,�8�8�y��c��e�w�M�H��ƥ"5༦G6�P:�Qa,������e=G�ُ�G�J؀��EVJa� j��rS-�F�΋��^�& �n�wB�ijL��F$��\�?) jKI�P)��mP�Q���2^��J�P%w�VH� � ��`��-9u���Q�������m����A�I��JsVB��’:Iq�Na���Fܲo��W�]��rt�j���6������0n�H��8�O ������qʯ�wؘh-�ce�[�U r�M��U�~ٹ�M0�} UӐo�r�L+��6gl�ܰ[��PoN/׸���}/9

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907