πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-43033 β€Ό

An issue was discovered in Bento4 1.6.0-639. There is a bad free in the component AP4_HdlrAtom::~AP4_HdlrAtom() which allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43034 β€Ό

An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43184 β€Ό

D-Link DIR878 1.30B08 Hotfix_04 was discovered to contain a command injection vulnerability via the component /bin/proc.cgi.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43044 β€Ό

GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_get_meta_item_info at /isomedia/meta.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23734 β€Ό

A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacker control the data being deserialized. This vulnerability affected all versions of GitHub Enterprise Server prior to v3.6 and was fixed in versions 3.5.3, 3.4.6, 3.3.11, and 3.2.16. This vulnerability was reported via the GitHub Bug Bounty program.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43042 β€Ό

GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function FixSDTPInTRAF at isomedia/isom_intern.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43185 β€Ό

A stored cross-site scripting (XSS) vulnerability in the Configuration/Holidays module of Rukovoditel v3.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43032 β€Ό

An issue was discovered in Bento4 v1.6.0-639. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp, as demonstrated by mp42aac.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43035 β€Ό

An issue was discovered in Bento4 v1.6.0-639. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-43043 β€Ό

GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function BD_CheckSFTimeOffset at /bifs/field_decode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43045 β€Ό

GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_dump_vrml_sffield at /scene_manager/scene_dump.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39301 β€Ό

sra-admin is a background rights management system that separates the front and back end. sra-admin version 1.1.1 has a storage cross-site scripting (XSS) vulnerability. After logging into the sra-admin background, an attacker can upload an html page containing xss attack code in "Personal Center" - "Profile Picture Upload" allowing theft of the user's personal information. This issue has been patched in 1.1.2. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Kaspersky Launches New VPN to Amplify Speed and Convenience πŸ•΄

New version boosts VPN tunnel performance and lets users prioritize secure connection traffic for certain services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Zscaler Advances Enterprise Data Security With Zero-Configuration Data Protection πŸ•΄

New data-protection innovations mitigate security risks by expediting deployment cycles and simplifying operational complexity.

πŸ“– Read

via "Dark Reading".
⚠ Women in Cryptology – USPS celebrates WW2 codebreakers ⚠

What did you do in the war, Mom? Oh, y'know, a bit of this and that...

πŸ“– Read

via "Naked Security".
πŸ‘1
πŸ•΄ SBOMs: An Overhyped Concept That Won't Secure Your Software Supply Chain πŸ•΄

We need more than the incomplete snapshot SBOMs provide to have real impact.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2022-43428 β€Ό

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43433 β€Ό

Jenkins ScreenRecorder Plugin 0.7 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43409 β€Ό

Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43419 β€Ό

Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43420 β€Ό

Jenkins Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.

πŸ“– Read

via "National Vulnerability Database".