Search for vulnerabilities
Vulnerability details: VCID-he54-pyj9-aaac
Vulnerability ID VCID-he54-pyj9-aaac
Aliases CVE-2014-0481
GHSA-296w-6qhq-gf92
PYSEC-2014-5
Summary The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0481.html
epss 0.00869 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.02343 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.03015 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.03015 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.03015 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
epss 0.03015 https://api.first.org/data/v1/epss?cve=CVE-2014-0481
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1129952
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
cvssv3.1 7.5 http://secunia.com/advisories/61281
generic_textual HIGH http://secunia.com/advisories/61281
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-296w-6qhq-gf92
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99
generic_textual MODERATE https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99
cvssv3.1 7.5 https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41
generic_textual MODERATE https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41
cvssv3.1 7.5 https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1
generic_textual MODERATE https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-5.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-5.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2014-0481
generic_textual Low https://ubuntu.com/security/notices/USN-2347-1
cvssv3.1 5.3 https://www.djangoproject.com/weblog/2014/aug/20/security
generic_textual MODERATE https://www.djangoproject.com/weblog/2014/aug/20/security
generic_textual Low https://www.djangoproject.com/weblog/2014/aug/20/security/
cvssv3.1 5.3 http://www.debian.org/security/2014/dsa-3010
generic_textual MODERATE http://www.debian.org/security/2014/dsa-3010
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0481.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0481.json
https://api.first.org/data/v1/epss?cve=CVE-2014-0481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
http://secunia.com/advisories/59782
http://secunia.com/advisories/61276
http://secunia.com/advisories/61281
https://github.com/django/django
https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99
https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41
https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-5.yaml
https://ubuntu.com/security/notices/USN-2347-1
https://www.djangoproject.com/weblog/2014/aug/20/security
https://www.djangoproject.com/weblog/2014/aug/20/security/
http://www.debian.org/security/2014/dsa-3010
1129952 https://bugzilla.redhat.com/show_bug.cgi?id=1129952
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*
CVE-2014-0481 https://nvd.nist.gov/vuln/detail/CVE-2014-0481
GHSA-296w-6qhq-gf92 https://github.com/advisories/GHSA-296w-6qhq-gf92
GLSA-201412-22 https://security.gentoo.org/glsa/201412-22
USN-2347-1 https://usn.ubuntu.com/2347-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://secunia.com/advisories/61281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-5.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0481
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://www.djangoproject.com/weblog/2014/aug/20/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.debian.org/security/2014/dsa-3010
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.60692
EPSS Score 0.00869
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.