πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-25567 β€Ό

GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that implements NTLM authentication, has an out-of-bounds read when decoding target information prior to version 1.2.0. The length of the `av_pair` is not checked properly for two of the elements which can trigger an out-of-bound read. The out-of-bounds read can be triggered via the main `gss_accept_sec_context` entry point and could cause a denial-of-service if the memory is unmapped. The issue is fixed in version 1.2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22942 β€Ό

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the Γ’β‚¬Λœkvstore_clientÒ€ℒ REST endpoint lets a potential attacker update SSG [App Key Value Store (KV store)](https://docs.splunk.com/Documentation/Splunk/latest/Admin/AboutKVstore) collections using an HTTP GET request. SSG is a Splunk-built app that comes with Splunk Enterprise. The vulnerability affects instances with SSG and Splunk Web enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22940 β€Ό

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the Γ’β‚¬ΛœcollectÒ€ℒ search processing language (SPL) command, including Γ’β‚¬ΛœsummaryindexÒ€ℒ, Γ’β‚¬ΛœsumindexÒ€ℒ, Γ’β‚¬ΛœstashÒ€ℒ,Ò€ℒ mcollectÒ€ℒ, and Γ’β‚¬ΛœmeventcollectÒ€ℒ, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25566 β€Ό

GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, a memory leak can be triggered when parsing usernames which can trigger a denial-of-service. The domain portion of a username may be overridden causing an allocated memory area the size of the domain name to be leaked. An attacker can leak memory via the main `gss_accept_sec_context` entry point, potentially causing a denial-of-service. This issue is fixed in version 1.2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0830 β€Ό

A vulnerability classified as critical has been found in EasyNAS 1.1.0. Affected is the function system of the file /backup.pl. The manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-220950 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ•΄ Oakland City Services Struggle to Recover From Ransomware Attack πŸ•΄

Fire emergency, 911 services functioning, along with Oakland financial systems, city says.

πŸ“– Read

via "Dark Reading".
⚠ Apple fixes zero-day spyware implant bug – patch now! ⚠

Everyone update now! Except for those who don't need to! Or who need to but will only get updates later on, though Apple isn't saying yet!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-21570 β€Ό

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21699 β€Ό

Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21717 β€Ό

Microsoft SharePoint Server Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21705 β€Ό

Microsoft SQL Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21687 β€Ό

HTTP.sys Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21568 β€Ό

Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21703 β€Ό

Azure Data Box Gateway Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21704 β€Ό

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21706 β€Ό

Microsoft Exchange Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21701 β€Ό

Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21714 β€Ό

Microsoft Office Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21713 β€Ό

Microsoft SQL Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21528 β€Ό

Microsoft SQL Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21694 β€Ό

Windows Fax Service Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".