Search for vulnerabilities
Vulnerability details: VCID-u1fv-9zsy-aaac
Vulnerability ID VCID-u1fv-9zsy-aaac
Aliases CVE-2015-0221
GHSA-jhjg-w2cp-5j44
PYSEC-2015-6
Summary The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 7.5 http://advisories.mageia.org/MGASA-2015-0026.html
generic_textual MODERATE http://advisories.mageia.org/MGASA-2015-0026.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
cvssv3.1 7.5 http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
cvssv3.1 6.1 http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0221.html
epss 0.0491 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.08824 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.09455 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.09455 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.09455 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
epss 0.10068 https://api.first.org/data/v1/epss?cve=CVE-2015-0221
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1179679
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0220
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-jhjg-w2cp-5j44
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/blob/9b9c805cedb08621bd5dc58a01a6478eb7cc49a9/docs/releases/1.4.18.txt#L48C1-L49C1
generic_textual MODERATE https://github.com/django/django/blob/9b9c805cedb08621bd5dc58a01a6478eb7cc49a9/docs/releases/1.4.18.txt#L48C1-L49C1
cvssv3.1 7.5 https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f
generic_textual MODERATE https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f
cvssv3.1 7.5 https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a
generic_textual MODERATE https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a
cvssv3.1 7.5 https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7
generic_textual MODERATE https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-6.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-6.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0221
generic_textual Medium https://ubuntu.com/security/notices/USN-2469-1
cvssv3.1 7.5 https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
generic_textual MODERATE https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
cvssv3.1 7.5 https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
generic_textual MODERATE https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
cvssv3.1 6.1 https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
generic_textual MODERATE https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
cvssv3.1 7.5 https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
generic_textual MODERATE https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
cvssv3.1 7.5 https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
generic_textual MODERATE https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual MODERATE https://www.djangoproject.com/weblog/2015/jan/13/security
generic_textual Medium https://www.djangoproject.com/weblog/2015/jan/13/security/
cvssv3.1 7.5 http://ubuntu.com/usn/usn-2469-1
generic_textual MODERATE http://ubuntu.com/usn/usn-2469-1
cvssv3.1 6.1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2015-0026.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0221.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0221.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221
http://secunia.com/advisories/62285
http://secunia.com/advisories/62309
http://secunia.com/advisories/62718
https://github.com/django/django
https://github.com/django/django/blob/9b9c805cedb08621bd5dc58a01a6478eb7cc49a9/docs/releases/1.4.18.txt#L48C1-L49C1
https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f
https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a
https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-6.yaml
https://ubuntu.com/security/notices/USN-2469-1
https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
https://www.djangoproject.com/weblog/2015/jan/13/security
https://www.djangoproject.com/weblog/2015/jan/13/security/
http://ubuntu.com/usn/usn-2469-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
1179679 https://bugzilla.redhat.com/show_bug.cgi?id=1179679
775375 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775375
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
CVE-2015-0221 https://nvd.nist.gov/vuln/detail/CVE-2015-0221
GHSA-jhjg-w2cp-5j44 https://github.com/advisories/GHSA-jhjg-w2cp-5j44
USN-2469-1 https://usn.ubuntu.com/2469-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://advisories.mageia.org/MGASA-2015-0026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/blob/9b9c805cedb08621bd5dc58a01a6478eb7cc49a9/docs/releases/1.4.18.txt#L48C1-L49C1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-6.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0221
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2015/jan/13/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://ubuntu.com/usn/usn-2469-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82281
EPSS Score 0.0491
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.