Show filters
112 Total Results
Displaying 91-100 of 112
Sort by:
Attacker Value
Unknown
CVE-2013-6044
Disclosure Date: October 04, 2013 (last updated October 05, 2023)
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
0
Attacker Value
Unknown
CVE-2013-4249
Disclosure Date: October 04, 2013 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
0
Attacker Value
Unknown
CVE-2013-1443
Disclosure Date: September 23, 2013 (last updated October 05, 2023)
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
0
Attacker Value
Unknown
CVE-2013-4315
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
0
Attacker Value
Unknown
CVE-2013-0305
Disclosure Date: May 02, 2013 (last updated October 05, 2023)
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
0
Attacker Value
Unknown
CVE-2013-0306
Disclosure Date: May 02, 2013 (last updated October 05, 2023)
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
0
Attacker Value
Unknown
CVE-2012-4520
Disclosure Date: November 18, 2012 (last updated October 05, 2023)
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
0
Attacker Value
Unknown
CVE-2012-3444
Disclosure Date: July 31, 2012 (last updated October 04, 2023)
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
0
Attacker Value
Unknown
CVE-2012-3442
Disclosure Date: July 31, 2012 (last updated October 04, 2023)
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
0
Attacker Value
Unknown
CVE-2012-3443
Disclosure Date: July 31, 2012 (last updated October 04, 2023)
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
0