Description of the security update for SharePoint Server 2019: May 9, 2023 (KB5002389)

None ## Summary This security update resolves a Microsoft SharePoint Server spoofing vulnerability, Microsoft SharePoint Server information disclosure vulnerability, and Microsoft SharePoint Server re ...

Continue Reading

CVSS3 - HIGH

RHEL 9 : fence-agents (RHSA-2023:2161)

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2023:2161 advisory. - OAuthLib is an implementation of the OAuth reque ...

Continue Reading

CVSS3 - MEDIUM

Amazon Linux 2023 : ecs-service-connect-agent (ALAS2023-2023-165)

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2023-165 advisory. - Envoy is an open source edge and service proxy designed for cloud-native applications. Prior ...

Continue Reading

CVSS3 - CRITICAL

PYSEC-2023-42

rami.io pretix before 4.17.1 allows OAuth application authorization from a logged-out session. The fixed versions are 4.15.1, 4.16.1, and 4.17.1.Read More ...

Continue Reading

CVSS3 - HIGH

Databricks Platform Cluster Isolation Bypass

Post ContentRead More ...

Continue Reading
(RHSA-2023:2097) Important: Satellite 6.13 Release

Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized too ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - HIGH

CVE-2023-27496

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a `state` query param ...

Continue Reading

CVSS3 - HIGH

CVE-2023-27496

A flaw was found in Envoy. If Envoy is running with the OAuth filter enabled, a malicious actor could construct a request which would cause denial of service, crashing Envoy.Read More ...

Continue Reading

CVSS3 - HIGH

Back to Main

Subscribe for the latest news: