Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replay
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | CVE-2011-0698 | 14 Feb 201121:00 | – | cve |
![]() | Directory traversal in Django | 23 Jul 201819:52 | – | github |
![]() | Directory traversal | 14 Feb 201121:00 | – | prion |
![]() | CVE-2011-0698 | 14 Feb 201120:00 | – | cvelist |
![]() | High severity vulnerability that affects django | 23 Jul 201819:52 | – | osv |
![]() | PYSEC-2011-12 | 14 Feb 201121:00 | – | osv |
![]() | CVE-2011-0698 | 14 Feb 201100:00 | – | ubuntucve |
![]() | CVE-2011-0698 | 14 Feb 201121:00 | – | nvd |
![]() | CVE-2011-0698 | 14 Feb 201121:00 | – | debiancve |
![]() | Mandriva Update for python-django MDVSA-2011:031 (python-django) | 22 Feb 201100:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo