Show filters
112 Total Results
Displaying 1-10 of 112
Sort by:
Attacker Value
Unknown

CVE-2024-45231

Disclosure Date: October 08, 2024 (last updated October 19, 2024)
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
Attacker Value
Unknown

CVE-2024-45230

Disclosure Date: October 08, 2024 (last updated October 19, 2024)
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Attacker Value
Unknown

CVE-2024-42005

Disclosure Date: August 07, 2024 (last updated October 24, 2024)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.
Attacker Value
Unknown

CVE-2024-41991

Disclosure Date: August 07, 2024 (last updated August 08, 2024)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
Attacker Value
Unknown

CVE-2024-41990

Disclosure Date: August 07, 2024 (last updated August 08, 2024)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Attacker Value
Unknown

CVE-2024-41989

Disclosure Date: August 07, 2024 (last updated August 08, 2024)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.
Attacker Value
Unknown

CVE-2024-24680

Disclosure Date: February 06, 2024 (last updated February 16, 2024)
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Attacker Value
Unknown

CVE-2023-43665

Disclosure Date: November 03, 2023 (last updated November 14, 2023)
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Attacker Value
Unknown

CVE-2023-41164

Disclosure Date: November 03, 2023 (last updated November 14, 2023)
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Attacker Value
Unknown

CVE-2023-46695

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.