Логотип exploitDog
product: "django"
Консоль
Логотип exploitDog

exploitDog

product: "django"

Количество 673

Количество 673

nvd логотип

CVE-2018-7537

больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-7537

больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2018-6188

больше 7 лет назад

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-6188

больше 7 лет назад

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-6188

больше 7 лет назад

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-6188

больше 7 лет назад

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0. ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2018-16984

больше 6 лет назад

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 4.9
EPSS: Низкий
redhat логотип

CVE-2018-16984

больше 6 лет назад

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 2.7
EPSS: Низкий
nvd логотип

CVE-2018-16984

больше 6 лет назад

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 4.9
EPSS: Низкий
debian логотип

CVE-2018-16984

больше 6 лет назад

An issue was discovered in Django 2.1 before 2.1.2, in which unprivile ...

CVSS3: 4.9
EPSS: Низкий
ubuntu логотип

CVE-2018-14574

почти 7 лет назад

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 6.1
EPSS: Средний
redhat логотип

CVE-2018-14574

почти 7 лет назад

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 4.7
EPSS: Средний
nvd логотип

CVE-2018-14574

почти 7 лет назад

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 6.1
EPSS: Средний
debian логотип

CVE-2018-14574

почти 7 лет назад

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11 ...

CVSS3: 6.1
EPSS: Средний
ubuntu логотип

CVE-2017-7234

около 8 лет назад

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2017-7234

около 8 лет назад

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2017-7234

около 8 лет назад

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2017-7234

около 8 лет назад

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2017-7233

около 8 лет назад

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2017-7233

около 8 лет назад

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-7537

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-7537

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...

CVSS3: 5.3
2%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-6188

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-6188

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 5.3
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-6188

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-6188

django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0. ...

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-16984

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 4.9
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-16984

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 2.7
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-16984

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

CVSS3: 4.9
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-16984

An issue was discovered in Django 2.1 before 2.1.2, in which unprivile ...

CVSS3: 4.9
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-14574

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 6.1
15%
Средний
почти 7 лет назад
redhat логотип
CVE-2018-14574

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 4.7
15%
Средний
почти 7 лет назад
nvd логотип
CVE-2018-14574

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.

CVSS3: 6.1
15%
Средний
почти 7 лет назад
debian логотип
CVE-2018-14574

django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11 ...

CVSS3: 6.1
15%
Средний
почти 7 лет назад
ubuntu логотип
CVE-2017-7234

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 6.1
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-7234

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 4.7
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-7234

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.

CVSS3: 6.1
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-7234

A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before ...

CVSS3: 6.1
0%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2017-7233

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
1%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-7233

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
1%
Низкий
около 8 лет назад

Уязвимостей на страницу