Search for vulnerabilities
Vulnerability details: VCID-pfqz-gzvt-aaac
Vulnerability ID VCID-pfqz-gzvt-aaac
Aliases CVE-2015-0219
GHSA-7qfw-j7hp-v45g
PYSEC-2015-4
Summary Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 7.5 http://advisories.mageia.org/MGASA-2015-0026.html
generic_textual MODERATE http://advisories.mageia.org/MGASA-2015-0026.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
cvssv3.1 6.1 http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0219.html
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00818 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00866 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00866 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00866 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.00866 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.02248 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03128 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
epss 0.03722 https://api.first.org/data/v1/epss?cve=CVE-2015-0219
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1179672
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0220
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-7qfw-j7hp-v45g
cvssv3.1 5.3 https://github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py#L151
generic_textual MODERATE https://github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py#L151
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.3 https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
generic_textual MODERATE https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
cvssv3.1 5.3 https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
generic_textual MODERATE https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
cvssv3.1 5.3 https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
generic_textual MODERATE https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0219
generic_textual Medium https://ubuntu.com/security/notices/USN-2469-1
cvssv3.1 7.5 https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
generic_textual MODERATE https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
cvssv3.1 7.5 https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
generic_textual MODERATE https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
cvssv3.1 6.1 https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
generic_textual MODERATE https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
cvssv3.1 7.5 https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
generic_textual MODERATE https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
cvssv3.1 7.5 https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
generic_textual MODERATE https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual MODERATE https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual Medium https://www.djangoproject.com/weblog/2015/jan/13/security/
cvssv3.1 6.1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
cvssv3.1 5.3 http://www.ubuntu.com/usn/USN-2469-1
generic_textual MODERATE http://www.ubuntu.com/usn/USN-2469-1
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2015-0026.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0219.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0219.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221
http://secunia.com/advisories/62285
http://secunia.com/advisories/62309
http://secunia.com/advisories/62718
https://github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py#L151
https://github.com/django/django
https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
https://ubuntu.com/security/notices/USN-2469-1
https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
https://www.djangoproject.com/weblog/2015/jan/13/security
https://www.djangoproject.com/weblog/2015/jan/13/security/
http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
http://www.ubuntu.com/usn/USN-2469-1
1179672 https://bugzilla.redhat.com/show_bug.cgi?id=1179672
775375 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775375
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*
CVE-2015-0219 https://nvd.nist.gov/vuln/detail/CVE-2015-0219
GHSA-7qfw-j7hp-v45g https://github.com/advisories/GHSA-7qfw-j7hp-v45g
USN-2469-1 https://usn.ubuntu.com/2469-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://advisories.mageia.org/MGASA-2015-0026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py#L151
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0219
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2015/jan/13/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://www.ubuntu.com/usn/USN-2469-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82291
EPSS Score 0.00818
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.