Django — свободный фреймворк для веб-приложений на языке Python, использующий шаблон проектирования MVC
Релизный цикл, информация об уязвимостях
График релизов
Количество 673
GHSA-r28v-mw67-m5p9
Django denial-of-service possibility in urlize and urlizetrunc template filters
GHSA-2f9x-5v75-3qv4
Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters

BDU:2019-01260
Уязвимость библиотеки Django для языка программирования Python, позволяющая нарушителю нарушить целостность защищаемой информации
GHSA-5hg3-6c2f-f3wr
Django open redirect
GHSA-rf4j-j272-fj86
Django vulnerable to information leakage in AuthenticationForm
GHSA-6mx3-3vqg-hpp2
Django allows unprivileged users to read the password hashes of arbitrary accounts

CVE-2018-16984
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
CVE-2018-16984
An issue was discovered in Django 2.1 before 2.1.2, in which unprivile ...

CVE-2018-16984
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVE-2018-16984
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
GHSA-r28v-mw67-m5p9 Django denial-of-service possibility in urlize and urlizetrunc template filters | CVSS3: 5.3 | 1% Низкий | больше 6 лет назад | |
GHSA-2f9x-5v75-3qv4 Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters | CVSS3: 5.3 | 2% Низкий | больше 6 лет назад | |
![]() | BDU:2019-01260 Уязвимость библиотеки Django для языка программирования Python, позволяющая нарушителю нарушить целостность защищаемой информации | CVSS3: 6.5 | 2% Низкий | больше 6 лет назад |
GHSA-5hg3-6c2f-f3wr Django open redirect | CVSS3: 6.1 | 15% Средний | больше 6 лет назад | |
GHSA-rf4j-j272-fj86 Django vulnerable to information leakage in AuthenticationForm | CVSS3: 7.5 | 2% Низкий | больше 6 лет назад | |
GHSA-6mx3-3vqg-hpp2 Django allows unprivileged users to read the password hashes of arbitrary accounts | CVSS3: 4.9 | 1% Низкий | больше 6 лет назад | |
![]() | CVE-2018-16984 An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | CVSS3: 4.9 | 1% Низкий | больше 6 лет назад |
CVE-2018-16984 An issue was discovered in Django 2.1 before 2.1.2, in which unprivile ... | CVSS3: 4.9 | 1% Низкий | больше 6 лет назад | |
![]() | CVE-2018-16984 An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | CVSS3: 4.9 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-16984 An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | CVSS3: 2.7 | 1% Низкий | больше 6 лет назад |
Уязвимостей на страницу