Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/Django14@1.4.8-1?arch=el6ost
Typerpm
Namespaceredhat
NameDjango14
Version1.4.8-1
Qualifiers
arch el6ost
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-gwme-keqv-kkgr
vulnerability_id VCID-gwme-keqv-kkgr
summary The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1521.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1521.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6044.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6044
reference_id
reference_type
scores
0
value 0.04123
scoring_system epss
scoring_elements 0.88642
published_at 2026-04-11T12:55:00Z
1
value 0.04123
scoring_system epss
scoring_elements 0.8863
published_at 2026-04-09T12:55:00Z
2
value 0.04123
scoring_system epss
scoring_elements 0.88625
published_at 2026-04-08T12:55:00Z
3
value 0.04123
scoring_system epss
scoring_elements 0.88607
published_at 2026-04-07T12:55:00Z
4
value 0.04123
scoring_system epss
scoring_elements 0.88605
published_at 2026-04-04T12:55:00Z
5
value 0.04123
scoring_system epss
scoring_elements 0.88587
published_at 2026-04-02T12:55:00Z
6
value 0.04123
scoring_system epss
scoring_elements 0.88578
published_at 2026-04-01T12:55:00Z
7
value 0.04123
scoring_system epss
scoring_elements 0.88643
published_at 2026-04-21T12:55:00Z
8
value 0.04123
scoring_system epss
scoring_elements 0.88648
published_at 2026-04-16T12:55:00Z
9
value 0.04123
scoring_system epss
scoring_elements 0.88635
published_at 2026-04-13T12:55:00Z
10
value 0.04123
scoring_system epss
scoring_elements 0.88634
published_at 2026-04-12T12:55:00Z
11
value 0.04123
scoring_system epss
scoring_elements 0.88644
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6044
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6044
5
reference_url http://seclists.org/oss-sec/2013/q3/369
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q3/369
6
reference_url http://seclists.org/oss-sec/2013/q3/411
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q3/411
7
reference_url http://secunia.com/advisories/54476
reference_id
reference_type
scores
url http://secunia.com/advisories/54476
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/86437
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/86437
9
reference_url https://github.com/django/django
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/django/django
10
reference_url https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f
11
reference_url https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762
12
reference_url https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a
13
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-21.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-21.yaml
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-6044
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-6044
15
reference_url https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
16
reference_url http://www.debian.org/security/2013/dsa-2740
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2013/dsa-2740
17
reference_url http://www.securityfocus.com/bid/61777
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/61777
18
reference_url http://www.securitytracker.com/id/1028915
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028915
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1016394
reference_id 1016394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1016394
20
reference_url https://github.com/advisories/GHSA-9cwg-mhxf-hh59
reference_id GHSA-9cwg-mhxf-hh59
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9cwg-mhxf-hh59
21
reference_url https://access.redhat.com/errata/RHSA-2013:1521
reference_id RHSA-2013:1521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1521
fixed_packages
aliases CVE-2013-6044, GHSA-9cwg-mhxf-hh59, PYSEC-2013-21
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwme-keqv-kkgr
1
url VCID-qjqs-zfd5-ckbt
vulnerability_id VCID-qjqs-zfd5-ckbt
summary Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1521.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1521.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4315.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4315.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4315
reference_id
reference_type
scores
0
value 0.00983
scoring_system epss
scoring_elements 0.76839
published_at 2026-04-21T12:55:00Z
1
value 0.00983
scoring_system epss
scoring_elements 0.76743
published_at 2026-04-01T12:55:00Z
2
value 0.00983
scoring_system epss
scoring_elements 0.76746
published_at 2026-04-02T12:55:00Z
3
value 0.00983
scoring_system epss
scoring_elements 0.76775
published_at 2026-04-04T12:55:00Z
4
value 0.00983
scoring_system epss
scoring_elements 0.76757
published_at 2026-04-07T12:55:00Z
5
value 0.00983
scoring_system epss
scoring_elements 0.76788
published_at 2026-04-08T12:55:00Z
6
value 0.00983
scoring_system epss
scoring_elements 0.76799
published_at 2026-04-09T12:55:00Z
7
value 0.00983
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-11T12:55:00Z
8
value 0.00983
scoring_system epss
scoring_elements 0.76808
published_at 2026-04-12T12:55:00Z
9
value 0.00983
scoring_system epss
scoring_elements 0.768
published_at 2026-04-13T12:55:00Z
10
value 0.00983
scoring_system epss
scoring_elements 0.76843
published_at 2026-04-16T12:55:00Z
11
value 0.00983
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4315
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4315
5
reference_url http://secunia.com/advisories/54772
reference_id
reference_type
scores
url http://secunia.com/advisories/54772
6
reference_url http://secunia.com/advisories/54828
reference_id
reference_type
scores
url http://secunia.com/advisories/54828
7
reference_url https://github.com/django/django
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django
8
reference_url https://github.com/django/django/commit/87d2750b39f6f2d54b7047225521a44dcd37e896
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/87d2750b39f6f2d54b7047225521a44dcd37e896
9
reference_url https://github.com/django/django/commit/988b61c550d798f9a66d17ee0511fb7a9a7f33ca
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/988b61c550d798f9a66d17ee0511fb7a9a7f33ca
10
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-20.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-20.yaml
11
reference_url https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued
12
reference_url https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/
reference_id
reference_type
scores
url https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/
13
reference_url http://www.debian.org/security/2013/dsa-2755
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2013/dsa-2755
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1004969
reference_id 1004969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1004969
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722605
reference_id 722605
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722605
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4315
reference_id CVE-2013-4315
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4315
17
reference_url https://github.com/advisories/GHSA-vjjp-9r83-22rc
reference_id GHSA-vjjp-9r83-22rc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vjjp-9r83-22rc
18
reference_url https://access.redhat.com/errata/RHSA-2013:1521
reference_id RHSA-2013:1521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1521
19
reference_url https://usn.ubuntu.com/1967-1/
reference_id USN-1967-1
reference_type
scores
url https://usn.ubuntu.com/1967-1/
fixed_packages
aliases CVE-2013-4315, GHSA-vjjp-9r83-22rc, PYSEC-2013-20
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjqs-zfd5-ckbt
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/Django14@1.4.8-1%3Farch=el6ost