Show filters
166 Total Results
Displaying 11-20 of 166
Sort by:
Attacker Value
Unknown

CVE-2024-21520

Disclosure Date: June 26, 2024 (last updated June 26, 2024)
Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags.
0
Attacker Value
Unknown

CVE-2024-32879

Disclosure Date: April 24, 2024 (last updated April 25, 2024)
Python Social Auth is a social authentication/registration mechanism. Prior to version 5.4.1, due to default case-insensitive collation in MySQL or MariaDB databases, third-party authentication user IDs are not case-sensitive and could cause different IDs to match. This issue has been addressed by a fix released in version 5.4.1. An immediate workaround would be to change collation of the affected field.
0
Attacker Value
Unknown

CVE-2024-28865

Disclosure Date: March 18, 2024 (last updated January 05, 2025)
django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users.
0
Attacker Value
Unknown

CVE-2024-26164

Disclosure Date: March 12, 2024 (last updated January 12, 2025)
Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-2319

Disclosure Date: March 08, 2024 (last updated March 09, 2024)
Cross-Site Scripting (XSS) vulnerability in the Django MarkdownX project, affecting version 4.0.2. An attacker could store a specially crafted JavaScript payload in the upload functionality due to lack of proper sanitisation of JavaScript elements.
0
Attacker Value
Unknown

CVE-2024-24680

Disclosure Date: February 06, 2024 (last updated February 16, 2024)
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Attacker Value
Unknown

CVE-2024-22199

Disclosure Date: January 11, 2024 (last updated January 19, 2024)
This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks.
Attacker Value
Unknown

CVE-2023-43665

Disclosure Date: November 03, 2023 (last updated November 14, 2023)
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Attacker Value
Unknown

CVE-2023-41164

Disclosure Date: November 03, 2023 (last updated November 14, 2023)
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Attacker Value
Unknown

CVE-2023-46695

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.