FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 11:22:49 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
14a37474-1383-11e0-8a58-00215c6a37bbdjango -- multiple vulnerabilities

Django project reports:

Today the Django team is issuing multiple releases -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- to remedy two security issues reported to us. All users of affected versions of Django are urged to upgrade immediately.

Information leakage in Django administrative interface

The Django administrative interface, django.contrib.admin supports filtering of displayed lists of objects by fields on the corresponding models, including across database-level relationships. This is implemented by passing lookup arguments in the querystring portion of the URL, and options on the ModelAdmin class allow developers to specify particular fields or relationships which will generate automatic links for filtering.

Denial-of-service attack in password-reset mechanism

Django's bundled authentication framework, django.contrib.auth, offers views which allow users to reset a forgotten password. The reset mechanism involves generating a one-time token composed from the user's ID, the timestamp of the reset request converted to a base36 integer, and a hash derived from the user's current password hash (which will change once the reset is complete, thus invalidating the token).


Discovery 2010-12-22
Entry 2010-12-29
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.4

gt 1.1 lt 1.1.3

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15032,1

45562
45563
https://bugzilla.redhat.com/show_bug.cgi?id=665373
http://secunia.com/advisories/42715/
3ff95dd3-c291-11df-b0dc-00215c6a37bbdjango -- cross-site scripting vulnerability

Django project reports:

The provided template tag for inserting the CSRF token into forms -- {% csrf_token %} -- explicitly trusts the cookie value, and displays it as-is. Thus, an attacker who is able to tamper with the value of the CSRF cookie can cause arbitrary content to be inserted, unescaped, into the outgoing HTML of the form, enabling cross-site scripting (XSS) attacks.


Discovery 2010-09-13
Entry 2010-09-17
py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
gt 1.2 lt 1.2.2

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 13698,1

43116
CVE-2010-3082
http://xforce.iss.net/xforce/xfdb/61729
87917d6f-ba76-11de-bac2-001a4d563a0fdjango -- denial-of-service attack

Django project reports:

Django's forms library includes field types which perform regular-expression-based validation of email addresses and URLs. Certain addresses/URLs could trigger a pathological performance case in these regular expression, resulting in the server process/thread becoming unresponsive, and consuming excessive CPU over an extended period of time. If deliberately triggered, this could result in an effectively denial-of-service attack.


Discovery 2009-10-09
Entry 2009-10-16
Modified 2010-05-02
py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
< 1.1.1

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 11603,1

CVE-2009-3695
http://www.djangoproject.com/weblog/2009/oct/09/security/
bd760627-3493-11e0-8103-00215c6a37bbdjango -- multiple vulnerabilities

Django project reports:

Today the Django team is issuing multiple releases -- Django 1.2.5 and Django 1.1.4 -- to remedy three security issues reported to us. All users of affected versions of Django are urged to upgrade immediately.


Discovery 2011-02-08
Entry 2011-02-09
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.5

gt 1.1 lt 1.1.4

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15470,1

http://www.djangoproject.com/weblog/2011/feb/08/security/
d01d10c7-de2d-11e0-b215-00215c6a37bbdjango -- multiple vulnerabilities

The Django project reports:

Please reference CVE/URL list for details


Discovery 2011-09-09
Entry 2011-09-13
Modified 2011-11-01
py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
ge 1.3 lt 1.3.1

ge 1.2 lt 1.2.7

py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 16758,1

https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
d2c2952d-85a1-11dc-bfff-003048705d5apy-django -- denial of service vulnerability

Django project reports:

A per-process cache used by Django's internationalization ("i18n") system to store the results of translation lookups for particular values of the HTTP Accept-Language header used the full value of that header as a key. An attacker could take advantage of this by sending repeated requests with extremely large strings in the Accept-Language header, potentially causing a denial of service by filling available memory.

Due to limitations imposed by Web server software on the size of HTTP header fields, combined with reasonable limits on the number of requests which may be handled by a single server process over its lifetime, this vulnerability may be difficult to exploit. Additionally, it is only present when the "USE_I18N" setting in Django is "True" and the i18n middleware component is enabled*. Nonetheless, all users of affected versions of Django are encouraged to update.


Discovery 2007-10-26
Entry 2007-10-27
py23-django
py24-django
py25-django
< 0.96.1

py23-django-devel
py24-django-devel
py25-django-devel
< 20071026

http://www.djangoproject.com/weblog/2007/oct/26/security-fix/
f49ba347-2190-11dd-907c-001c2514716cdjango -- XSS vulnerability

Django project reports:

The Django administration application will, when accessed by a user who is not sufficiently authenticated, display a login form and ask the user to provide the necessary credentials before displaying the requested page. This form will be submitted to the URL the user attempted to access, by supplying the current request path as the value of the form's "action" attribute.

The value of the request path was not being escaped, creating an opportunity for a cross-site scripting (XSS) attack by leading a user to a URL which contained URL-encoded HTML and/or JavaScript in the request path.


Discovery 2008-05-10
Entry 2008-05-14
Modified 2010-05-12
py23-django
py24-django
py25-django
< 0.96.2

py23-django-devel
py24-django-devel
py25-django-devel
< 20080511

CVE-2008-2302
http://www.djangoproject.com/weblog/2008/may/14/security/