{"url":"http://public2.vulnerablecode.io/api/packages/936347?format=json","purl":"pkg:deb/debian/python-django@1.4.2-1?distro=trixie","type":"deb","namespace":"debian","name":"python-django","version":"1.4.2-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.4.4-1","latest_non_vulnerable_version":"3:5.2.14-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/5299?format=json","vulnerability_id":"VCID-m7dr-pjnv-hkb5","summary":"The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4520","reference_id":"","reference_type":"","scores":[{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88378","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88386","published_at":"2026-05-16T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8835","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88328","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88298","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4520"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=865164","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=865164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4520"},{"reference_url":"http://secunia.com/advisories/51033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51033"},{"reference_url":"http://secunia.com/advisories/51314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51314"},{"reference_url":"http://securitytracker.com/id?1027708","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1027708"},{"reference_url":"https://github.com/django/django","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django"},{"reference_url":"https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3"},{"reference_url":"https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e"},{"reference_url":"https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-7.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-7.yaml"},{"reference_url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html"},{"reference_url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html"},{"reference_url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4520","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4520"},{"reference_url":"https://ubuntu.com/usn/usn-1632-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://ubuntu.com/usn/usn-1632-1"},{"reference_url":"https://ubuntu.com/usn/usn-1757-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://ubuntu.com/usn/usn-1757-1"},{"reference_url":"https://web.archive.org/web/20140417023920/http://securitytracker.com/id?1027708","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20140417023920/http://securitytracker.com/id?1027708"},{"reference_url":"https://www.debian.org/security/2013/dsa-2634","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2013/dsa-2634"},{"reference_url":"https://www.djangoproject.com/weblog/2012/oct/17/security","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.djangoproject.com/weblog/2012/oct/17/security"},{"reference_url":"https://www.djangoproject.com/weblog/2012/oct/17/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.djangoproject.com/weblog/2012/oct/17/security/"},{"reference_url":"https://www.openwall.com/lists/oss-security/2012/10/30/4","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.openwall.com/lists/oss-security/2012/10/30/4"},{"reference_url":"http://ubuntu.com/usn/usn-1632-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-1632-1"},{"reference_url":"http://ubuntu.com/usn/usn-1757-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-1757-1"},{"reference_url":"http://www.debian.org/security/2013/dsa-2634","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2013/dsa-2634"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/10/30/4","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2012/10/30/4"},{"reference_url":"http://www.osvdb.org/86493","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/86493"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/advisories/GHSA-2655-q453-22f9","reference_id":"GHSA-2655-q453-22f9","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2655-q453-22f9"},{"reference_url":"https://usn.ubuntu.com/1632-1/","reference_id":"USN-1632-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1632-1/"},{"reference_url":"https://usn.ubuntu.com/1757-1/","reference_id":"USN-1757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/936347?format=json","purl":"pkg:deb/debian/python-django@1.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@1.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/936332?format=json","purl":"pkg:deb/debian/python-django@2:2.2.28-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1adz-zw3h-pqek"},{"vulnerability":"VCID-46pv-pzsu-jucd"},{"vulnerability":"VCID-ac4c-321h-tqfk"},{"vulnerability":"VCID-buuq-c9ps-jfdu"},{"vulnerability":"VCID-ff2a-at5f-2qa8"},{"vulnerability":"VCID-gfym-spzk-w7gk"},{"vulnerability":"VCID-jzae-1awh-k7cm"},{"vulnerability":"VCID-mga4-an1w-qqf9"},{"vulnerability":"VCID-rwyy-f7jh-pubf"},{"vulnerability":"VCID-ssut-reka-r3f8"},{"vulnerability":"VCID-xhpa-mffz-syfy"},{"vulnerability":"VCID-z47n-5z72-u3bm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@2:2.2.28-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/936330?format=json","purl":"pkg:deb/debian/python-django@3:3.2.19-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1adz-zw3h-pqek"},{"vulnerability":"VCID-46pv-pzsu-jucd"},{"vulnerability":"VCID-ac4c-321h-tqfk"},{"vulnerability":"VCID-buuq-c9ps-jfdu"},{"vulnerability":"VCID-ff2a-at5f-2qa8"},{"vulnerability":"VCID-gfym-spzk-w7gk"},{"vulnerability":"VCID-jzae-1awh-k7cm"},{"vulnerability":"VCID-mga4-an1w-qqf9"},{"vulnerability":"VCID-rwyy-f7jh-pubf"},{"vulnerability":"VCID-ssut-reka-r3f8"},{"vulnerability":"VCID-xhpa-mffz-syfy"},{"vulnerability":"VCID-z47n-5z72-u3bm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:3.2.19-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/936418?format=json","purl":"pkg:deb/debian/python-django@3:3.2.25-0%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1adz-zw3h-pqek"},{"vulnerability":"VCID-46pv-pzsu-jucd"},{"vulnerability":"VCID-ac4c-321h-tqfk"},{"vulnerability":"VCID-buuq-c9ps-jfdu"},{"vulnerability":"VCID-ff2a-at5f-2qa8"},{"vulnerability":"VCID-gfym-spzk-w7gk"},{"vulnerability":"VCID-jzae-1awh-k7cm"},{"vulnerability":"VCID-mga4-an1w-qqf9"},{"vulnerability":"VCID-rwyy-f7jh-pubf"},{"vulnerability":"VCID-ssut-reka-r3f8"},{"vulnerability":"VCID-xhpa-mffz-syfy"},{"vulnerability":"VCID-z47n-5z72-u3bm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:3.2.25-0%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/936334?format=json","purl":"pkg:deb/debian/python-django@3:4.2.28-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1adz-zw3h-pqek"},{"vulnerability":"VCID-46pv-pzsu-jucd"},{"vulnerability":"VCID-ac4c-321h-tqfk"},{"vulnerability":"VCID-buuq-c9ps-jfdu"},{"vulnerability":"VCID-ff2a-at5f-2qa8"},{"vulnerability":"VCID-gfym-spzk-w7gk"},{"vulnerability":"VCID-rwyy-f7jh-pubf"},{"vulnerability":"VCID-ssut-reka-r3f8"},{"vulnerability":"VCID-z47n-5z72-u3bm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:4.2.28-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/936333?format=json","purl":"pkg:deb/debian/python-django@3:4.2.29-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1adz-zw3h-pqek"},{"vulnerability":"VCID-46pv-pzsu-jucd"},{"vulnerability":"VCID-ff2a-at5f-2qa8"},{"vulnerability":"VCID-gfym-spzk-w7gk"},{"vulnerability":"VCID-ssut-reka-r3f8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:4.2.29-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1041995?format=json","purl":"pkg:deb/debian/python-django@3:4.2.30-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-buuq-c9ps-jfdu"},{"vulnerability":"VCID-rwyy-f7jh-pubf"},{"vulnerability":"VCID-z47n-5z72-u3bm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:4.2.30-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088727?format=json","purl":"pkg:deb/debian/python-django@3:5.2.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:5.2.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103049?format=json","purl":"pkg:deb/debian/python-django@3:5.2.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:5.2.14-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1112573?format=json","purl":"pkg:deb/debian/python-django@3:5.2.14-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@3:5.2.14-2%3Fdistro=trixie"}],"aliases":["CVE-2012-4520","GHSA-2655-q453-22f9","PYSEC-2012-7"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m7dr-pjnv-hkb5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-django@1.4.2-1%3Fdistro=trixie"}