Search for vulnerabilities
Vulnerability details: VCID-1wfy-k55k-aaar
Vulnerability ID VCID-1wfy-k55k-aaar
Aliases CVE-2015-0222
GHSA-6g95-x6cj-mg4v
PYSEC-2015-7
Summary ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 7.5 http://advisories.mageia.org/MGASA-2015-0026.html
generic_textual MODERATE http://advisories.mageia.org/MGASA-2015-0026.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
cvssv3.1 6.1 http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0222.html
epss 0.02375 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02375 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02375 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02476 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.02765 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
epss 0.04573 https://api.first.org/data/v1/epss?cve=CVE-2015-0222
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1179685
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0222
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-6g95-x6cj-mg4v
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392
generic_textual MODERATE https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392
cvssv3.1 7.5 https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c
generic_textual MODERATE https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-7.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-7.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0222
generic_textual Medium https://ubuntu.com/security/notices/USN-2469-1
cvssv3.1 7.5 https://web.archive.org/web/20161201073154/http://secunia.com/advisories/62285
generic_textual MODERATE https://web.archive.org/web/20161201073154/http://secunia.com/advisories/62285
cvssv3.1 7.5 https://web.archive.org/web/20161201073337/http://secunia.com/advisories/62309
generic_textual MODERATE https://web.archive.org/web/20161201073337/http://secunia.com/advisories/62309
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual MODERATE https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual Medium https://www.djangoproject.com/weblog/2015/jan/13/security/
cvssv3.1 7.5 http://ubuntu.com/usn/usn-2469-1
generic_textual MODERATE http://ubuntu.com/usn/usn-2469-1
cvssv3.1 6.1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2015-0026.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0222.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0222.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0222
http://secunia.com/advisories/62285
http://secunia.com/advisories/62309
https://github.com/django/django
https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392
https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-7.yaml
https://ubuntu.com/security/notices/USN-2469-1
https://web.archive.org/web/20161201073154/http://secunia.com/advisories/62285
https://web.archive.org/web/20161201073337/http://secunia.com/advisories/62309
https://www.djangoproject.com/weblog/2015/jan/13/security
https://www.djangoproject.com/weblog/2015/jan/13/security/
http://ubuntu.com/usn/usn-2469-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
1179685 https://bugzilla.redhat.com/show_bug.cgi?id=1179685
775375 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775375
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
CVE-2015-0222 https://nvd.nist.gov/vuln/detail/CVE-2015-0222
GHSA-6g95-x6cj-mg4v https://github.com/advisories/GHSA-6g95-x6cj-mg4v
USN-2469-1 https://usn.ubuntu.com/2469-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://advisories.mageia.org/MGASA-2015-0026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-7.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0222
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20161201073154/http://secunia.com/advisories/62285
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20161201073337/http://secunia.com/advisories/62309
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2015/jan/13/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://ubuntu.com/usn/usn-2469-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.89536
EPSS Score 0.02375
Published At Dec. 27, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.