Логотип exploitDog
product: "django"
Консоль
Логотип exploitDog

exploitDog

product: "django"
Django

Djangoсвободный фреймворк для веб-приложений на языке Python, использующий шаблон проектирования MVC

Релизный цикл, информация об уязвимостях

Продукт: Django
Вендор: djangoproject

График релизов

4.25.05.15.26.02023202420252026202720282029

Недавние уязвимости Django

Количество 750

nvd логотип

CVE-2022-36359

больше 3 лет назад

An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2022-36359

больше 3 лет назад

An issue was discovered in the HTTP FileResponse class in Django 3.2 b ...

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2022-36359

больше 3 лет назад

An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-09092

больше 3 лет назад

Уязвимость программной платформы для веб-приложений Django, связанная с загрузкой кода без проверки его целостности, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-p64x-8rxx-wf6q

больше 3 лет назад

Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2022-34265

больше 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2022-34265

больше 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0 ...

CVSS3: 9.8
EPSS: Критический
ubuntu логотип

CVE-2022-34265

больше 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
EPSS: Критический
redhat логотип

CVE-2022-34265

больше 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-59w8-4wm2-4xw8

больше 3 лет назад

Django Image Field Vulnerable to Image Decompression Bombs

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2022-36359

An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-36359

An issue was discovered in the HTTP FileResponse class in Django 3.2 b ...

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-36359

An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-09092

Уязвимость программной платформы для веб-приложений Django, связанная с загрузкой кода без проверки его целостности, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-p64x-8rxx-wf6q

Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection

CVSS3: 9.8
93%
Критический
больше 3 лет назад
nvd логотип
CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
93%
Критический
больше 3 лет назад
debian логотип
CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0 ...

CVSS3: 9.8
93%
Критический
больше 3 лет назад
ubuntu логотип
CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
93%
Критический
больше 3 лет назад
redhat логотип
CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
93%
Критический
больше 3 лет назад
github логотип
GHSA-59w8-4wm2-4xw8

Django Image Field Vulnerable to Image Decompression Bombs

CVSS3: 7.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться