Show filters
33 Total Results
Displaying 21-30 of 33
Sort by:
Attacker Value
Unknown
CVE-2019-13177
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.
0
Attacker Value
Unknown
CVE-2018-1000089
Disclosure Date: March 13, 2018 (last updated November 26, 2024)
Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.
0
Attacker Value
Unknown
CVE-2018-6596
Disclosure Date: February 03, 2018 (last updated November 26, 2024)
webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
0
Attacker Value
Unknown
CVE-2017-16764
Disclosure Date: November 10, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-6591
Disclosure Date: March 09, 2017 (last updated November 26, 2024)
There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
0
Attacker Value
Unknown
CVE-2015-0846
Disclosure Date: April 24, 2015 (last updated October 05, 2023)
django-markupfield before 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote attackers to include and read arbitrary files via unspecified vectors.
0
Attacker Value
Unknown
CVE-2009-2659
Disclosure Date: August 04, 2009 (last updated October 04, 2023)
The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.
0
Attacker Value
Unknown
CVE-2008-3909
Disclosure Date: September 04, 2008 (last updated October 04, 2023)
The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.
0
Attacker Value
Unknown
CVE-2008-2302
Disclosure Date: May 23, 2008 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.
0
Attacker Value
Unknown
CVE-2007-5828
Disclosure Date: November 05, 2007 (last updated November 08, 2023)
Cross-site request forgery (CSRF) vulnerability in the admin panel in Django 0.96 allows remote attackers to change passwords of arbitrary users via a request to admin/auth/user/1/password/. NOTE: this issue has been disputed by Debian, since product documentation includes a recommendation for a CSRF protection module that is included with the product. However, CVE considers this an issue because the default configuration does not use this module
0