Search for vulnerabilities
Vulnerability details: VCID-vw6v-s1t1-aaaf
Vulnerability ID VCID-vw6v-s1t1-aaaf
Aliases CVE-2014-0483
GHSA-rw75-m7gp-92m3
PYSEC-2014-7
Summary The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0483.html
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00224 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00367 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2014-0483
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1129959
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
cvssv3.1 7.5 http://secunia.com/advisories/61281
generic_textual HIGH http://secunia.com/advisories/61281
cvssv3.1_qr LOW https://github.com/advisories/GHSA-rw75-m7gp-92m3
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.3 https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0
generic_textual MODERATE https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0
cvssv3.1 5.3 https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446
generic_textual MODERATE https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446
cvssv3.1 5.3 https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6
generic_textual MODERATE https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6
cvssv3.1 5.3 https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f
generic_textual MODERATE https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-7.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-7.yaml
cvssv2 3.5 https://nvd.nist.gov/vuln/detail/CVE-2014-0483
generic_textual Low https://ubuntu.com/security/notices/USN-2347-1
cvssv3.1 5.3 https://web.archive.org/web/20151016194735/http://secunia.com/advisories/61276
generic_textual MODERATE https://web.archive.org/web/20151016194735/http://secunia.com/advisories/61276
cvssv3.1 5.3 https://web.archive.org/web/20151016202523/http://secunia.com/advisories/59782
generic_textual MODERATE https://web.archive.org/web/20151016202523/http://secunia.com/advisories/59782
cvssv3.1 5.3 https://web.archive.org/web/20151023143840/http://secunia.com/advisories/61281
generic_textual MODERATE https://web.archive.org/web/20151023143840/http://secunia.com/advisories/61281
cvssv3.1 5.3 https://www.djangoproject.com/weblog/2014/aug/20/security
generic_textual MODERATE https://www.djangoproject.com/weblog/2014/aug/20/security
generic_textual Low https://www.djangoproject.com/weblog/2014/aug/20/security/
cvssv3.1 5.3 http://www.debian.org/security/2014/dsa-3010
generic_textual MODERATE http://www.debian.org/security/2014/dsa-3010
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0483.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0483.json
https://api.first.org/data/v1/epss?cve=CVE-2014-0483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
http://secunia.com/advisories/59782
http://secunia.com/advisories/61276
http://secunia.com/advisories/61281
https://github.com/django/django
https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0
https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446
https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6
https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-7.yaml
https://ubuntu.com/security/notices/USN-2347-1
https://web.archive.org/web/20151016194735/http://secunia.com/advisories/61276
https://web.archive.org/web/20151016202523/http://secunia.com/advisories/59782
https://web.archive.org/web/20151023143840/http://secunia.com/advisories/61281
https://www.djangoproject.com/weblog/2014/aug/20/security
https://www.djangoproject.com/weblog/2014/aug/20/security/
http://www.debian.org/security/2014/dsa-3010
1129959 https://bugzilla.redhat.com/show_bug.cgi?id=1129959
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
CVE-2014-0483 https://nvd.nist.gov/vuln/detail/CVE-2014-0483
GHSA-rw75-m7gp-92m3 https://github.com/advisories/GHSA-rw75-m7gp-92m3
GLSA-201412-22 https://security.gentoo.org/glsa/201412-22
USN-2347-1 https://usn.ubuntu.com/2347-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://secunia.com/advisories/61281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-7.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0483
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://web.archive.org/web/20151016194735/http://secunia.com/advisories/61276
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://web.archive.org/web/20151016202523/http://secunia.com/advisories/59782
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://web.archive.org/web/20151023143840/http://secunia.com/advisories/61281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://www.djangoproject.com/weblog/2014/aug/20/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.debian.org/security/2014/dsa-3010
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.61123
EPSS Score 0.00224
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.