🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2023-22469 ‼

Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21678 ‼

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21760, CVE-2023-21765.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21743 ‼

Microsoft SharePoint Server Security Feature Bypass Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21543 ‼

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21546, CVE-2023-21555, CVE-2023-21556, CVE-2023-21679.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-46163 ‼

Travel support program is a rails app to support the travel support program of openSUSE (TSP). Sensitive user data (bank account details, password Hash) can be extracted via Ransack query injection. Every deployment of travel-support-program below the patched version is affected. The travel-support-program uses the Ransack library to implement search functionality. In its default configuration, Ransack will allow for query conditions based on properties of associated database objects [1]. The `*_start`, `*_end` or `*_cont` search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force (A match is indicated by the returned JSON not being empty). A single bank account number can be extracted with <200 requests, a password hash can be extracted with ~1200 requests, all within a few minutes. The problem has been patched in commit d22916275c51500b4004933ff1b0a69bc807b2b7. In order to work around this issue, you can also cherry pick that patch, however it will not work without the Rails 5.0 migration that was done in #150, which in turn had quite a few pull requests it depended on.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21734 ‼

Microsoft Office Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21735.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21792 ‼

3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21791, CVE-2023-21793.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21774 ‼

Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21748, CVE-2023-21749, CVE-2023-21750, CVE-2023-21754, CVE-2023-21755, CVE-2023-21772, CVE-2023-21773.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21536 ‼

Event Tracing for Windows Information Disclosure Vulnerability. This CVE ID is unique from CVE-2023-21753.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21791 ‼

3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21792, CVE-2023-21793.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21782 ‼

3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21779 ‼

Visual Studio Code Remote Code Execution.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-38105 ‼

An information disclosure vulnerability exists in the cm_processREQ_NC opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packets can lead to a disclosure of sensitive information. An attacker can send a network request to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21767 ‼

Windows Overlay Filter Elevation of Privilege Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21681 ‼

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21748 ‼

Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21749, CVE-2023-21750, CVE-2023-21754, CVE-2023-21755, CVE-2023-21772, CVE-2023-21773, CVE-2023-21774.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21728 ‼

Windows Netlogon Denial of Service Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21733 ‼

Windows Bind Filter Driver Elevation of Privilege Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21725 ‼

Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21546 ‼

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21543, CVE-2023-21555, CVE-2023-21556, CVE-2023-21679.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-21539 ‼

Windows Authentication Remote Code Execution Vulnerability.

📖 Read

via "National Vulnerability Database".