Skip to content
  Tuesday 20 January 2026
Trending
October 16, 2023RomCom RAT Variant Targets Women Political Leaders November 3, 2023Cryptomining Operation Exploits AWS Cloud Keys from Public GitHub Repositories in EleKtra-Leak Campaign April 11, 2025Director, Product Management – Cybersecurity November 30, 2023Chips Market to be Further Influenced by Generative AI September 28, 2025IA/CYBERSECURITY LEAD February 23, 2025Senior Cybersecurity Risk Analyst March 27, 2023Cybersecurity Update March 27th 2023: UK TikTok Ban, Snipping Tool Flaw Update, and Ultrasound Attacks November 26, 2023Space Force Cybersecurity Policy Expert September 5, 2025Cybersecurity Internship- Summer 2026 May 30, 2025<h3>Zscaler, Netskope, Palo Alto Lead Gartner’s SSE Magic Quadrant</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Microsoft Addresses Three Zero-Day Vulnerabilities
Industry News

Microsoft Addresses Three Zero-Day Vulnerabilities

SecuredyouadmSecuredyouadm—October 11, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

IBM Acquires HashiCorp for $6.4 Billion, Boosts Hybrid Cloud Power

February 28, 2025

Revolutionizing 3D Design: The Impact of Gen AI

December 10, 2024

US Charges and Sanctions Alleged Chinese Hacker Behind Sophos Firewall Attack

December 10, 2024

Regeneron Acquires 23andMe: A New Era for Genetic Privacy?

May 20, 2025



In its October patch dump, Microsoft addressed three zero-day vulnerabilities that were actively being exploited. The first vulnerability, tracked as CVE-2023-36563, was found in WordPad and could be exploited to obtain hashed passwords. Attackers could exploit this flaw by running a specially crafted application on a vulnerable computer or by using social engineering to convince users to run the application themselves.

The second vulnerability addressed by Microsoft was found in the Skype for Business server. Tracked as CVE-2023-41763, this flaw could reveal the victim’s IP address, potentially providing access to internal networks. While Microsoft did not specify the scope of the disclosure, appropriate network segmentation can help mitigate the risks.

Lastly, Microsoft fixed a flaw in the HTTP/2 protocol, known as “Rapid Reset,” which was being used by hackers to launch distributed denial of service (DDoS) attacks. Tracked as CVE-2023-44487, this flaw allowed attackers to overwhelm target servers or applications by continuously sending and canceling requests. Amazon, Google, and Cloudflare also took measures to mitigate this vulnerability.

Overall, Microsoft’s October patch dump addressed three zero-day vulnerabilities that were actively exploited. These vulnerabilities affected WordPad, Skype for Business, and the HTTP/2 protocol, with potential consequences such as obtaining hashed passwords, revealing IP addresses, and launching DDoS attacks.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Hacktivists Seek Publicity by Taking Sides in Israel-Hamas Conflict
Private Label Supplement Manufacturing Transformed by Data Analytics
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures