Page 18 of 99 results (0.014 seconds)

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload. Vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Django v1.1.x anteriores a v1.1.4 y v1.2.x anteriores a v1.2.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del nombre de fichero vinculado a la subida de un archivo. • http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://secunia.com/advisories/43297 http://secunia.com/advisories/43382 http://secunia.com/advisories/43426 http://www.debian.org/security/2011/dsa-2163 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 0

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447. Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 no valida correctamente las solicitudes HTTP que contienen una cabecera X-Requested-With , que facilita a los atacantes remotos para llevar a cabo ataques de vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) , permite a atacantes remotos secuestrar la autenticación de los administradores mediante peticiones AJAX manipuladas que aprovechan una "combinación de complementos del navegador y redirecciones, esta vulnerabilidad esta relacionada con CVE-2011-0447. • http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://secunia.com/advisories/43297 http://secunia.com/advisories/43382 http://secunia.com/advisories/43426 http://www.debian.org/security/2011/dsa-2163 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva& • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays. Vulnerabilidad de salto de directorio en Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 en Windows, cuando está habilitado permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres /(barra) en la llave de una cookie de sesión , relacionada con la repetición de sesiones. • http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva.com/security/advisories?name=MDVSA-2011:031 http://www.securityfocus.com/bid/46296 http://www.vupen.com/english/advisories/2011/0372 http://www.vupen.com/english/advisories/2011/0439 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 13%CPEs: 16EXPL: 0

The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer. La funcionalidad de restablecimiento de contraseña en django.contrib.auth en Django antes de v1.1.3, v1.2.x antes de v1.2.4, y v1.3.x antes de v1.3 beta 1 no valida la longitud de una cadena que representa una marca de tiempo en base36, que permite a atacantes remotos ausar una denegación de servicio (consumo de recursos) a través de una URL que especifica un gran número entero en base36. • http://code.djangoproject.com/changeset/15032 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html http://secunia.com/advisories/42715 http://secunia.com/advisories/42827 http://secunia.com/advisories/42913 http://www.djangoproject.com/weblog/2010/dec/22/security http://www.openwall.com/lists/oss-security/2010/12/23/4 http://www.openwall.com/lists/oss-security/2011/01/03 • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 16EXPL: 3

The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter. El interfaz de administración de django.contrib.admin de Django en versiones anteriores a 1.1.3, 1.2.x anteriores a 1.2.4, y 1.3.x anteriores a 1.3 beta 1 no restringen apropiadamente el uso de la cadena de consulta para realizar filtrado de objetos. Lo que permite a usuarios autenticados remotos obtener información confidencial a través de peticiones que contengan expresiones regulares, como se ha demostrado con el parámetro created_by__password__regex. • http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html http://code.djangoproject.com/changeset/15031 http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter http://secunia.com/advisories/42715 http://secunia • CWE-264: Permissions, Privileges, and Access Controls •