<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cve on Shivasurya</title><link>http://shivasurya.me/categories/cve/</link><description>Recent content in Cve on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/cve/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-33186: Bypassing gRPC-Go Authorization with a Missing Slash</title><link>http://shivasurya.me/2026/04/01/cve-2026-33186-grpc-go-authorization-bypass/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2026/04/01/cve-2026-33186-grpc-go-authorization-bypass/</guid><description/></item><item><title>CVE-2023-23397 - Zero Click Net-NTLMv2 Credential Hash Leak on Outlook Client</title><link>http://shivasurya.me/2023/03/25/CVE-2023-23397-vulnerability-deep-dive-and-poc/</link><pubDate>Sat, 25 Mar 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/03/25/CVE-2023-23397-vulnerability-deep-dive-and-poc/</guid><description>&lt;h2 id="quick-overview">Quick Overview&lt;/h2>
&lt;p>Microsoft announced patch for &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397">CVE-2023-23397&lt;/a> which generally goes out usually on tuesday (Mar 14, 2023). This particular vulnerability caught my eyes due to the fact that I actively work on &lt;code>Active Directory&lt;/code> based HackTheBox machines and this one is something similar to &lt;code>Android Application Exploits&lt;/code> where attacker passes random url to &lt;code>activities&lt;/code> or &lt;code>services&lt;/code> and the outbound network connection often contains sensitive tokens attached to it.&lt;/p>
&lt;p>IIRC, I reported a similar vulnerability in 2020 which completely leaks encrypted sandbox local files including e-mail, tasks in the ProtonMail Android Client &lt;a href="https://proton.me/blog/protonmail-security-contributors">reference&lt;/a> However, it requires user interaction in the victim side of Android app.&lt;/p></description></item></channel></rss>