FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
05dc6efa-2370-11e3-95b7-00e0814cab4edjango -- denial-of-service via large passwords

The Django project reports:

These releases address a denial-of-service attack against Django's authentication framework. All users of Django are encouraged to upgrade immediately.


Discovery 2013-09-15
Entry 2013-09-22
Modified 2014-04-30
py26-django
ge 1.5 lt 1.5.4

ge 1.4 lt 1.4.8

py27-django
ge 1.5 lt 1.5.4

ge 1.4 lt 1.4.8

py26-django-devel
< 20130922,1

py27-django-devel
< 20130922,1

CVE-2013-1443
https://www.djangoproject.com/weblog/2013/sep/15/security/
14a37474-1383-11e0-8a58-00215c6a37bbdjango -- multiple vulnerabilities

Django project reports:

Today the Django team is issuing multiple releases -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- to remedy two security issues reported to us. All users of affected versions of Django are urged to upgrade immediately.

Information leakage in Django administrative interface

The Django administrative interface, django.contrib.admin supports filtering of displayed lists of objects by fields on the corresponding models, including across database-level relationships. This is implemented by passing lookup arguments in the querystring portion of the URL, and options on the ModelAdmin class allow developers to specify particular fields or relationships which will generate automatic links for filtering.

Denial-of-service attack in password-reset mechanism

Django's bundled authentication framework, django.contrib.auth, offers views which allow users to reset a forgotten password. The reset mechanism involves generating a one-time token composed from the user's ID, the timestamp of the reset request converted to a base36 integer, and a hash derived from the user's current password hash (which will change once the reset is complete, thus invalidating the token).


Discovery 2010-12-22
Entry 2010-12-29
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.4

gt 1.1 lt 1.1.3

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15032,1

45562
45563
https://bugzilla.redhat.com/show_bug.cgi?id=665373
http://secunia.com/advisories/42715/
21c59f5e-7cc5-11e2-9c11-080027a5ec9adjango -- multiple vulnerabilities

The Django Project reports:

These security releases fix four issues: one potential phishing vector, one denial-of-service vector, an information leakage issue, and a range of XML vulnerabilities.

  1. Host header poisoning

    an attacker could cause Django to generate and display URLs that link to arbitrary domains. This could be used as part of a phishing attack. These releases fix this problem by introducing a new setting, ALLOWED_HOSTS, which specifies a whitelist of domains your site is known to respond to.

    Important: by default Django 1.3.6 and 1.4.4 set ALLOWED_HOSTS to allow all hosts. This means that to actually fix the security vulnerability you should define this setting yourself immediately after upgrading.

  2. Formset denial-of-service

    an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. This has been fixed by adding a default maximum number of forms of 1,000. You can still manually specify a bigger max_num, if you wish, but 1,000 should be enough for anyone.

  3. XML attacks

    Django's serialization framework was vulnerable to attacks via XML entity expansion and external references; this is now fixed. However, if you're parsing arbitrary XML in other parts of your application, we recommend you look into the defusedxml Python packages which remedy this anywhere you parse XML, not just via Django's serialization framework.

  4. Data leakage via admin history log

    Django's admin interface could expose supposedly-hidden information via its history log. This has been fixed.


Discovery 2013-02-21
Entry 2013-02-24
py26-django
py27-django
ge 1.3 lt 1.3.6

ge 1.4 lt 1.4.4

CVE-2013-1664
CVE-2013-1665
CVE-2013-0305
CVE-2013-0306
58022
58061
3ff95dd3-c291-11df-b0dc-00215c6a37bbdjango -- cross-site scripting vulnerability

Django project reports:

The provided template tag for inserting the CSRF token into forms -- {% csrf_token %} -- explicitly trusts the cookie value, and displays it as-is. Thus, an attacker who is able to tamper with the value of the CSRF cookie can cause arbitrary content to be inserted, unescaped, into the outgoing HTML of the form, enabling cross-site scripting (XSS) attacks.


Discovery 2010-09-13
Entry 2010-09-17
py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
gt 1.2 lt 1.2.2

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 13698,1

43116
CVE-2010-3082
http://xforce.iss.net/xforce/xfdb/61729
59e72db2-cae6-11e3-8420-00e0814cab4edjango -- multiple vulnerabilities

The Django project reports:

These releases address an unexpected code-execution issue, a caching issue which can expose CSRF tokens and a MySQL typecasting issue. While these issues present limited risk and may not affect all Django users, we encourage all users to evaluate their own risk and upgrade as soon as possible.


Discovery 2014-04-21
Entry 2014-04-23
Modified 2014-04-30
py26-django
ge 1.6 lt 1.6.3

py27-django
ge 1.6 lt 1.6.3

py31-django
ge 1.6 lt 1.6.3

py32-django
ge 1.6 lt 1.6.3

py33-django
ge 1.6 lt 1.6.3

py34-django
ge 1.6 lt 1.6.3

py26-django15
ge 1.5 lt 1.5.6

py27-django15
ge 1.5 lt 1.5.6

py31-django15
ge 1.5 lt 1.5.6

py32-django15
ge 1.5 lt 1.5.6

py33-django15
ge 1.5 lt 1.5.6

py34-django15
ge 1.5 lt 1.5.6

py26-django14
ge 1.4 lt 1.4.11

py27-django14
ge 1.4 lt 1.4.11

py31-django14
ge 1.4 lt 1.4.11

py32-django14
ge 1.4 lt 1.4.11

py33-django14
ge 1.4 lt 1.4.11

py34-django14
ge 1.4 lt 1.4.11

py26-django-devel
< 20140423,1

py27-django-devel
< 20140423,1

https://www.djangoproject.com/weblog/2014/apr/21/security/
CVE-2014-0472
CVE-2014-0473
CVE-2014-0474
87917d6f-ba76-11de-bac2-001a4d563a0fdjango -- denial-of-service attack

Django project reports:

Django's forms library includes field types which perform regular-expression-based validation of email addresses and URLs. Certain addresses/URLs could trigger a pathological performance case in these regular expression, resulting in the server process/thread becoming unresponsive, and consuming excessive CPU over an extended period of time. If deliberately triggered, this could result in an effectively denial-of-service attack.


Discovery 2009-10-09
Entry 2009-10-16
Modified 2010-05-02
py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
< 1.1.1

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 11603,1

CVE-2009-3695
http://www.djangoproject.com/weblog/2009/oct/09/security/
a851b305-1bc3-11e3-95b7-00e0814cab4edjango -- multiple vulnerabilities

The Django project reports:

These releases address a directory-traversal vulnerability in one of Django's built-in template tags. While this issue requires some fairly specific factors to be exploitable, we encourage all users of Django to upgrade promptly.


Discovery 2013-09-10
Entry 2013-09-12
Modified 2014-04-30
py26-django
ge 1.5 lt 1.5.3

ge 1.4 lt 1.4.7

py27-django
ge 1.5 lt 1.5.3

ge 1.4 lt 1.4.7

py26-django-devel
< 20130912,1

py27-django-devel
< 20130912,1

CVE-2013-4315
https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/
bd760627-3493-11e0-8103-00215c6a37bbdjango -- multiple vulnerabilities

Django project reports:

Today the Django team is issuing multiple releases -- Django 1.2.5 and Django 1.1.4 -- to remedy three security issues reported to us. All users of affected versions of Django are urged to upgrade immediately.


Discovery 2011-02-08
Entry 2011-02-09
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.5

gt 1.1 lt 1.1.4

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15470,1

http://www.djangoproject.com/weblog/2011/feb/08/security/
d01d10c7-de2d-11e0-b215-00215c6a37bbdjango -- multiple vulnerabilities

The Django project reports:

Please reference CVE/URL list for details


Discovery 2011-09-09
Entry 2011-09-13
Modified 2011-11-01
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
ge 1.3 lt 1.3.1

ge 1.2 lt 1.2.7

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 16758,1

https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
f01292a0-db3c-11e1-a84b-00e0814cab4edjango -- multiple vulnerabilities

The Django project reports:

Today the Django team is issuing multiple releases -- Django 1.3.2 and Django 1.4.1 -- to remedy security issues reported to us:

  • Cross-site scripting in authentication views
  • Denial-of-service in image validation
  • Denial-of-service via get_image_dimensions()

All users are encouraged to upgrade Django immediately.


Discovery 2012-07-30
Entry 2012-07-31
Modified 2014-04-30
py26-django
ge 1.4 lt 1.4.1

ge 1.3 lt 1.3.2

py27-django
ge 1.4 lt 1.4.1

ge 1.3 lt 1.3.2

py26-django-devel
< 20120731,1

py27-django-devel
< 20120731,1

CVE-2012-3442
CVE-2012-3443
CVE-2012-3444
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/