Security
Headlines
HeadlinesLatestCVEs

Tag

#ssl

​Siemens SINAMICS Medium Voltage Products

​​As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). 1. EXECUTIVE SUMMARY ​CVSS v3 9.8 ​ATTENTION: Exploitable remotely / low attack complexity ​Vendor: Siemens ​Equipment: SINAMICS MV (medium voltage) products ​Vulnerabilities: Out-of-bounds Write, Out-of-bounds Read, Use After Free, Improper Authentication, OS Command Injection, Improper Certificate Validation, Improper Resource Shutdown or Release, Allocation of Resources Without Limits or Throttling, Incorrect Default Permissions, Improper Validation of Syntactic Correctness of Input, Improper Input Validation 2. RISK EVALUATION ​Successful exploitation of these vulnerabilities could lead to information leaks, denial of service, code execution, or grant access to an extern...

us-cert
#vulnerability#web#apple#linux#dos#perl#auth#ssl
CVE-2023-29349: Microsoft ODBC and OLE DB Remote Code Execution Vulnerability

**The following mitigating factors might be helpful in your situation:** Exploitation of the security issues in the drivers requires multiple steps, the primary of which is the ability of an attacker to direct a client (that they want to compromise) to connect to their malicious server. If your environment only connects to known, trusted servers and there is no ability to direct existing connection configurations to the wrong server (e.g., you use TLS encryption with certificate validation), these issues can not be exploited.

CVE-2023-29356: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

**The following mitigating factors might be helpful in your situation:** Exploitation of the security issues in the drivers requires multiple steps, the primary of which is the ability of an attacker to direct a client (that they want to compromise) to connect to their malicious server. If your environment only connects to known, trusted servers and there is no ability to direct existing connection configurations to the wrong server (e.g., you use TLS encryption with certificate validation), these issues can not be exploited.

CVE-2023-29356: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

**The following mitigating factors might be helpful in your situation:** Exploitation of this vulnerability requires an attacker to trick or convince the victim into connecting to their malicious server. If your environment only connects to known, trusted servers and there is no ability to reconfigure existing connections to point to another location (for example you use TLS encryption with certificate validation), the vulnerability cannot be exploited.

CVE-2023-29349: Microsoft ODBC and OLE DB Remote Code Execution Vulnerability

**The following mitigating factors might be helpful in your situation:** Exploitation of this vulnerability requires an attacker to trick or convince the victim into connecting to their malicious server. If your environment only connects to known, trusted servers and there is no ability to reconfigure existing connections to point to another location (for example you use TLS encryption with certificate validation), the vulnerability cannot be exploited.

CVE-2022-33159: Security Bulletin: IBM Security Directory Suite is vulnerable to multiple issues

IBM Security Directory Suite VA 8.0.1 through 8.0.1.19 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 228567.

Fortinet: Patched Critical Flaw May Have Been Exploited

Users urged to apply updates to FortiOS SSL-VPN after attackers may have leveraged a recently discovered vulnerability in attacks against government, manufacturing, and critical infrastructure organizations.

Temporary Phone Number: An Essential Tool for Privacy Protection

By Owais Sultan In an era where our lives are increasingly interconnected with the digital world, safeguarding our privacy has become… This is a post from HackRead.com Read the original post: Temporary Phone Number: An Essential Tool for Privacy Protection

CVE-2023-35147: Jenkins Security Advisory 2023-06-14

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVE-2023-35143: Jenkins Security Advisory 2023-06-14

Jenkins Maven Repository Server Plugin 1.10 and earlier does not escape the versions of build artifacts on the Build Artifacts As Maven Repository page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control maven project versions in `pom.xml`.