Security
Headlines
HeadlinesLatestCVEs

Tag

#git

AS-REP Roasting

Active Directory users that have the Kerberos pre-authentication enabled and require access to a resource initiate the Kerberos authentication process by sending an Authentication Server… Continue reading → AS-REP Roasting

Pentestlab
#mac#windows#git#java#perl#ldap#auth#maven
LockBit Ransomware's Darknet Domains Seized in Global Law Enforcement Raid

An international law enforcement operation has led to the seizure of multiple darknet domains operated by LockBit, one of the most prolific ransomware groups, marking the latest in a long list of digital takedowns. While the full extent of the effort, codenamed Operation Cronos, is presently unknown, visiting the group's .onion website displays a seizure banner containing the message "

GHSA-p3rv-qj56-2fqx: Cross-site Scripting in Pyhtml2pdf

Pyhtml2pdf version 0.0.6 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the HTML content entered by the user.

GHSA-3jcv-5f9p-2f2p: Cross-site Scripting in electron-pdf

electron-pdf version 20.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the HTML content entered by the user.

GHSA-5rwm-2xw8-hh9p: Deserialization of Untrusted Data in Torrentpier

Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.

GHSA-cp8m-h777-g4p3: Improper Access Control in moodle

Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers.

GHSA-jfrg-9hpq-9hvp: Improper Access Control in moodle

Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers.

GHSA-9r26-5w88-qhp9: Authorization Bypass in moodle

Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page).

GHSA-7pjp-fm93-p6pj: Cross-Site Request Forgery in moodle

The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.

GHSA-487g-3m3v-hjhq: Uncontrolled Resource Consumption in moodle

Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.