Show filters
166 Total Results
Displaying 21-30 of 166
Sort by:
Attacker Value
Unknown
CVE-2021-46898
Disclosure Date: October 22, 2023 (last updated October 31, 2023)
views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack.
0
Attacker Value
Unknown
CVE-2023-38941
Disclosure Date: August 04, 2023 (last updated October 08, 2023)
django-sspanel v2022.2.2 was discovered to contain a remote command execution (RCE) vulnerability via the component sspanel/admin_view.py -> GoodsCreateView._post.
0
Attacker Value
Unknown
CVE-2023-36053
Disclosure Date: July 03, 2023 (last updated November 15, 2023)
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
0
Attacker Value
Unknown
CVE-2023-2954
Disclosure Date: May 29, 2023 (last updated October 08, 2023)
Cross-site Scripting (XSS) - Stored in GitHub repository liangliangyy/djangoblog prior to master.
0
Attacker Value
Unknown
CVE-2023-33185
Disclosure Date: May 26, 2023 (last updated October 08, 2023)
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates. This issue was patched in version 3.5.0.
0
Attacker Value
Unknown
CVE-2023-31047
Disclosure Date: May 07, 2023 (last updated October 08, 2023)
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
0
Attacker Value
Unknown
CVE-2017-20182
Disclosure Date: March 10, 2023 (last updated October 20, 2023)
A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The patch is named 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611.
0
Attacker Value
Unknown
CVE-2023-24580
Disclosure Date: February 15, 2023 (last updated October 08, 2023)
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
0
Attacker Value
Unknown
CVE-2023-23969
Disclosure Date: February 01, 2023 (last updated October 08, 2023)
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
0
Attacker Value
Unknown
CVE-2016-15010
Disclosure Date: January 05, 2023 (last updated November 08, 2023)
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 is able to address this issue. The identifier of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
0