Known Vulnerabilities for products from Django-wiki Project

Listed below are 1 of the newest known vulnerabilities associated with the vendor "Django-wiki Project".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-25986 In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An att... 5.4 - MEDIUM 2021-11-23 2021-11-29

Popular searches for "Django-wiki Project"

Django Python web framework

Django is a Python-based free and open-source web framework that follows the modeltemplateviews architectural pattern. It is maintained by the Django Software Foundation, an independent organization established in the US as a 501 non-profit. Django's primary goal is to ease the creation of complex, database-driven websites. The framework emphasizes reusability and "pluggability" of components, less code, low coupling, rapid development, and the principle of don't repeat yourself.

Django

code.djangoproject.com/wiki

Django Django is an open source project, run by volunteers - people just like you! This document describes how the Django community works, and the various ways you can contribute. Tickets: View active tickets, make bug reports and contribute feature requests. The current branch under active development is Django 4.1.

Django (web framework) Bug tracking system GitHub Open-source software Software feature Login Wiki Process (computing) Document Software release life cycle BSD licenses Technology roadmap Repository (version control) Branching (version control) Software development Computer file Programmer Computer security Codebase Download

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report