Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ CVE-2021-32681

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2021-32681


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: web.nvd.nist.gov

Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). As a workaround, site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. ...



๐Ÿ“Œ Bugtraq: Advisory - Sourcetree - CVE-2017-14592 CVE-2017-14593 CVE-2017-14592 CVE-2017-17831


๐Ÿ“ˆ 4.71 Punkte

๐Ÿ“Œ Mehrere Sicherheitslรผcken [CVE-2022-38023, CVE-2022-37966, CVE-2022-37967, CVE-2022-45141] in Samba


๐Ÿ“ˆ 4.71 Punkte

๐Ÿ“Œ Reverse engineering Airspan AirSpot - Analysis of CVE-2022-36266, CVE-2022-36267, CVE-2022-36264, and CVE-2022-36265


๐Ÿ“ˆ 4.71 Punkte

๐Ÿ“Œ Bugtraq: CVE-2016-9277,CVE-2016-9966,CVE-2016-9967: Possible Privilege Escalation in telecom


๐Ÿ“ˆ 3.54 Punkte

๐Ÿ“Œ Bugtraq: CVE-2016-9277,CVE-2016-9966,CVE-2016-9967: Possible Privilege Escalation in telecom


๐Ÿ“ˆ 3.54 Punkte

๐Ÿ“Œ Microsoft patches three exploited zero-days (CVE-2023-21715, CVE-2023-23376, CVE-2023-21823)


๐Ÿ“ˆ 3.54 Punkte

๐Ÿ“Œ Bugtraq: CVE-2015-7944, CVE-2015-7945 - Ganeti Security Advisory (DoS, Unauthenticated Info Leak)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ [papers] - Roaming Through the OpenSSH Client: CVE-2016-0777 and CVE-2016-0778


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Re: [FD] [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: CVE-2015-0061 and CVE-2015-0063 (MS16-009/MS16-011)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-1014, CVE-2016-4247] Executable installers are vulnerable^WEVIL (case 35): Adobe's Flash Player (un)installers


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: CVE-2015-7944, CVE-2015-7945 - Ganeti Security Advisory (DoS, Unauthenticated Info Leak)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ [papers] - Roaming Through the OpenSSH Client: CVE-2016-0777 and CVE-2016-0778


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Re: [FD] [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: CVE-2015-0061 and CVE-2015-0063 (MS16-009/MS16-011)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-1014, CVE-2016-4247] Executable installers are vulnerable^WEVIL (case 35): Adobe's Flash Player (un)installers


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Multiple Vulnerabilities in ASUS Routers [CVE-2017-5891 and CVE-2017-5892]


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Is CVE-2017-0199 the new CVE-2012-0158?


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Datto Windows Agent 1.0.5.0 Remote Command Execution [CVE-2017-16673][CVE-2017-16674]


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Advisory - Bamboo - CVE-2017-14589 CVE-2017-14590


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2018-3667, CVE-2018-3668] Escalation of priviilege via executable installer of Intel Processor Diagnostic Tool


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Mozilla Firefox CVE-2007-2175 memory corruption [CVE-2007-2176]


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ Loading up a pair of Qt bugs: Detailing CVE-2019-1636 and CVE-2019-6739


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ flatpak: CVE-2019-8308: vulnerability similar to runc CVE-2019-5736 involving /proc/self/exe


๐Ÿ“ˆ 2.36 Punkte

๐Ÿ“Œ #0daytoday #Pulse Secure VPN Arbitrary Command Execution Exploit CVE-CVE-2019-11539 [remote #exploits #0day #Exploit]


๐Ÿ“ˆ 2.36 Punkte











matomo