Search for vulnerabilities
Vulnerability details: VCID-54h7-9zwf-aaam
Vulnerability ID VCID-54h7-9zwf-aaam
Aliases CVE-2012-3442
GHSA-78vx-ggch-wghm
PYSEC-2012-2
Summary The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00357 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00376 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00376 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00376 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00376 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2012-3442
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-78vx-ggch-wghm
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-78vx-ggch-wghm
cvssv3.1 3.7 https://github.com/django/django
cvssv3.1 6.1 https://github.com/django/django
generic_textual CRITICAL https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 6.1 https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
generic_textual CRITICAL https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
generic_textual MODERATE https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
cvssv3.1 6.1 https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
generic_textual CRITICAL https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
generic_textual MODERATE https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2012-3442
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2012-3442
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2012-3442
cvssv3.1 6.1 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
generic_textual CRITICAL https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
generic_textual HIGH https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
cvssv3.1 6.1 http://www.debian.org/security/2012/dsa-2529
cvssv3.1 7.5 http://www.debian.org/security/2012/dsa-2529
generic_textual CRITICAL http://www.debian.org/security/2012/dsa-2529
generic_textual HIGH http://www.debian.org/security/2012/dsa-2529
cvssv3.1 6.1 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
cvssv3.1 7.5 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
generic_textual CRITICAL http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
generic_textual HIGH http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
cvssv3.1 6.1 http://www.openwall.com/lists/oss-security/2012/07/31/1
cvssv3.1 7.5 http://www.openwall.com/lists/oss-security/2012/07/31/1
generic_textual CRITICAL http://www.openwall.com/lists/oss-security/2012/07/31/1
generic_textual HIGH http://www.openwall.com/lists/oss-security/2012/07/31/1
cvssv3.1 6.1 http://www.openwall.com/lists/oss-security/2012/07/31/2
cvssv3.1 7.5 http://www.openwall.com/lists/oss-security/2012/07/31/2
generic_textual CRITICAL http://www.openwall.com/lists/oss-security/2012/07/31/2
generic_textual HIGH http://www.openwall.com/lists/oss-security/2012/07/31/2
cvssv3.1 6.1 http://www.ubuntu.com/usn/USN-1560-1
cvssv3.1 7.5 http://www.ubuntu.com/usn/USN-1560-1
generic_textual CRITICAL http://www.ubuntu.com/usn/USN-1560-1
generic_textual HIGH http://www.ubuntu.com/usn/USN-1560-1
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2012-3442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3442
https://github.com/django/django
https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
http://www.debian.org/security/2012/dsa-2529
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
http://www.openwall.com/lists/oss-security/2012/07/31/1
http://www.openwall.com/lists/oss-security/2012/07/31/2
http://www.ubuntu.com/usn/USN-1560-1
683364 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683364
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
CVE-2012-3442 https://nvd.nist.gov/vuln/detail/CVE-2012-3442
GHSA-78vx-ggch-wghm https://github.com/advisories/GHSA-78vx-ggch-wghm
USN-1560-1 https://usn.ubuntu.com/1560-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2012-3442
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2012-3442
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.debian.org/security/2012/dsa-2529
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.debian.org/security/2012/dsa-2529
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2012/07/31/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.openwall.com/lists/oss-security/2012/07/31/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2012/07/31/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.openwall.com/lists/oss-security/2012/07/31/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.ubuntu.com/usn/USN-1560-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.ubuntu.com/usn/USN-1560-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.40488
EPSS Score 0.00348
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.