Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown
CVE-2016-9013
Disclosure Date: December 09, 2016 (last updated November 08, 2023)
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
0
Attacker Value
Unknown
CVE-2016-2513
Disclosure Date: April 08, 2016 (last updated November 25, 2024)
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
0
Attacker Value
Unknown
CVE-2016-2512
Disclosure Date: April 08, 2016 (last updated November 25, 2024)
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
0
Attacker Value
Unknown
CVE-2015-8213
Disclosure Date: December 07, 2015 (last updated October 05, 2023)
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
0
Attacker Value
Unknown
CVE-2015-5963
Disclosure Date: August 24, 2015 (last updated October 05, 2023)
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
0
Attacker Value
Unknown
CVE-2015-5964
Disclosure Date: August 24, 2015 (last updated October 05, 2023)
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-5144
Disclosure Date: July 14, 2015 (last updated October 05, 2023)
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
0
Attacker Value
Unknown
CVE-2015-5143
Disclosure Date: July 14, 2015 (last updated October 05, 2023)
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
0
Attacker Value
Unknown
CVE-2015-5145
Disclosure Date: July 14, 2015 (last updated October 05, 2023)
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-3982
Disclosure Date: June 02, 2015 (last updated October 05, 2023)
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
0