195eaac041
https://www.djangoproject.com/weblog/2013/feb/19/security/ - Host header poisoning: an attacker could cause Django to generate and display URLs that link to arbitrary domains. - Formset denial-of-service: an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. - XML attacks: Django's serialization framework was vulnerable to attacks via XML entity expansion and external references. - Data leakage via admin history log: Django's admin interface could expose supposedly-hidden information via its history log.
3 lines
113 B
Plaintext
3 lines
113 B
Plaintext
SHA256 (Django-1.4.5.tar.gz) = Dh6MQhcplnK7+UBJlHF/yi2NS3pPe4s7dNQT4f2oFCg=
|
|
SIZE (Django-1.4.5.tar.gz) = 7735582
|