Page 5 of 34 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 29EXPL: 0

The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL. Las clases (1) django.http.HttpResponseRedirect y (2) django.http.HttpResponsePermanentRedirect en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 no validan el esquema de un destino dredireccionado, lo que podría permitir a atacantes remotos conducir un ataque de secuencias de comandos en sitios cruzados (XSS) a través de un dato: URL. • http://www.debian.org/security/2012/dsa-2529 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 http://www.openwall.com/lists/oss-security/2012/07/31/1 http://www.openwall.com/lists/oss-security/2012/07/31/2 http://www.ubuntu.com/usn/USN-1560-1 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 2%CPEs: 29EXPL: 0

The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file. La clase django.forms.ImageField en el sistema de formularios en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 descomprime completamente los datos de la imagen durante la validación de la misma, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) mediante la subida de una imagen. • http://www.debian.org/security/2012/dsa-2529 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 http://www.openwall.com/lists/oss-security/2012/07/31/1 http://www.openwall.com/lists/oss-security/2012/07/31/2 http://www.ubuntu.com/usn/USN-1560-1 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 29EXPL: 0

The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image. La función get_image_dimensions en la funcionalidad image-handling en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 un tamaño de trozo constante en todos los intentos por determinar las dimensiones, lo que permitiría a atacantes remotos a provocar una denegación de servicio (consumo del proceso o hilo) a través de una imagen TIFF grande. • http://www.debian.org/security/2012/dsa-2529 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 http://www.openwall.com/lists/oss-security/2012/07/31/1 http://www.openwall.com/lists/oss-security/2012/07/31/2 http://www.ubuntu.com/usn/USN-1560-1 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.8EPSS: 1%CPEs: 22EXPL: 0

django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier. django.contrib.sessions en Django v1.2.7 y v1.3.x antereiores a v1.3.1, cuando los datos de sesión se almacena en la caché, utiliza el espacio de nombres raíz de los identificadores de sesión las teclas y los datos de aplicación, lo que permite a atacantes remotos modificar un sesión mediante la activación de uso de una clave que es igual al identificador de sesión. • http://openwall.com/lists/oss-security/2011/09/11/1 http://openwall.com/lists/oss-security/2011/09/13/2 http://secunia.com/advisories/46614 http://www.debian.org/security/2011/dsa-2332 https://bugzilla.redhat.com/show_bug.cgi?id=737366 https://hermes.opensuse.org/messages/14700881 https://www.djangoproject.com/weblog/2011/sep/09 https://www.djangoproject.com/weblog/2011/sep/10/127 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 22EXPL: 0

The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code. El mecanismo de protección ante CSRF de Django hasta la versión 1.2.7 y 1.3.x hasta la 1.3.1 no maneja apropiadamente las configuraciones del servidor web que soportan cabeceras HTTP Host arbitrarias, lo que permite a atacantes remotos provocar peticiones falsificadas sin autenticar a través de vectores que involucran un registro DNS CNAME y una página web que contenga código JavaScript. • http://openwall.com/lists/oss-security/2011/09/11/1 http://openwall.com/lists/oss-security/2011/09/13/2 http://secunia.com/advisories/46614 http://www.debian.org/security/2011/dsa-2332 https://bugzilla.redhat.com/show_bug.cgi?id=737366 https://hermes.opensuse.org/messages/14700881 https://www.djangoproject.com/weblog/2011/sep/09 https://www.djangoproject.com/weblog/2011/sep/10/127 • CWE-352: Cross-Site Request Forgery (CSRF) •