Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-29033

A vulnerability has been identified in JT2Go (All versions < V13.3.0.3), Teamcenter Visualization V13.3 (All versions < V13.3.0.3), Teamcenter Visualization V14.0 (All versions < V14.0.0.1). The CGM_NIST_Loader.dll library is vulnerable to uninitialized pointer free while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE
#vulnerability#pdf

%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 630.026 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 546.036 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 289.263 null] >> endobj 6 0 obj << /D [2 0 R /XYZ 70.866 182.359 null] >> endobj 7 0 obj << /D [8 0 R /XYZ 85.039 335.973 null] >> endobj 9 0 obj << /D [10 0 R /XYZ 70.866 649.338 null] >> endobj 11 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 12 0 R /Type /Page /Resources 13 0 R /Parent 14 0 R /Annots [15 0 R 16 0 R 17 0 R 18 0 R 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 15 0 obj << /A << /S /URI /Type /Action /URI (https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 446.564 518.276 457.981] >> endobj 17 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 409.209 433.497 421.886] >> endobj 18 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 380.613 446.757 392.03] >> endobj 19 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 355.214 433.497 367.891] >> endobj 20 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 326.618 446.757 338.035] >> endobj 21 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 301.218 433.497 313.895] >> endobj 22 0 obj << /A << /S /GoTo /D (section*.2) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [386.143 199.176 524.579 210.712] >> endobj 23 0 obj << /A << /S /GoTo /D (section*.4) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [147.498 181.363 309.548 192.78] >> endobj 13 0 obj << /ProcSet [/PDF /Text] /Font << /F51 24 0 R /F48 25 0 R >> >> endobj 12 0 obj << /Filter /FlateDecode /Length 2434 >> stream x��ZYs�F~ׯ�#X�极+/�l��l�D)�r����5HpqXq~�� �����rY3=�=_���2;:>�:�P$� f���HK�(B��`�>��i�LV�dJ���y]L�D�i�� �,��e� �~�nB7ם�E����黫 ̞M��}8z7;���p@� � �ˣ��`�>�HOv�2��!�\g��ѿ������4�)!�t���(R|C��G��0q�� "R{]�L�`X�7�!�c6’�9���[$$��bch�NȰ��&�+�E�U�:K�٧�"*՘���=�S�A�d �vd�}���t�?K{Y�c�b]2��(�A��A֥��~i� .&`Pe�zؗ�,(����F��"�zH Fb�w���H��*)�4K�4)�%�D!.�!�p*�΃P�U4$�!Ƣ��HW=�3���1���(� ��>Ɓ��;6�aF���#p~�0�!���+��ҁ�ܵ�x���k3���ЮJ��$c�6g.�n:3�M��

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda