mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
33 lines
1.3 KiB
JSON
33 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2024-45230",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-10-08T16:15:11.903",
|
|
"lastModified": "2024-10-10T12:56:30.817",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en Django 5.1 anterior a 5.1.1, 5.0 anterior a 5.0.9 y 4.2 anterior a 4.2.16. Los filtros de plantilla urlize() y urlizetrunc() est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio mediante entradas muy grandes con una secuencia espec\u00edfica de caracteres."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://docs.djangoproject.com/en/dev/releases/security/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://groups.google.com/forum/#%21forum/django-announce",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |