Search for packages
| purl | pkg:deb/debian/python-django@1.4.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1pvd-3217-6ygv | The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file. |
CVE-2012-3443
GHSA-59w8-4wm2-4xw8 PYSEC-2012-3 |
| VCID-7bu3-ckpj-gbf8 | The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image. |
CVE-2012-3444
GHSA-5h2q-4hrp-v9rr PYSEC-2012-4 |
| VCID-czkz-mcv8-mqfc | The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL. |
CVE-2012-3442
GHSA-78vx-ggch-wghm PYSEC-2012-2 |