Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
Package | Installed | Affected | Info |
---|---|---|---|
django-allauth | 0.63.2 | <0.63.6 |
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information. |
django-allauth | 0.63.2 | <0.63.3 |
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability. |
https://pyup.io/repos/github/cookiecutter/cookiecutter-django/python-3-shield.svg
[![Python 3](https://pyup.io/repos/github/cookiecutter/cookiecutter-django/python-3-shield.svg)](https://pyup.io/repos/github/cookiecutter/cookiecutter-django/)
.. image:: https://pyup.io/repos/github/cookiecutter/cookiecutter-django/python-3-shield.svg :target: https://pyup.io/repos/github/cookiecutter/cookiecutter-django/ :alt: Python 3
<a href="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/"><img src="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/cookiecutter/cookiecutter-django/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/cookiecutter/cookiecutter-django/
{<img src="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/cookiecutter/cookiecutter-django/]
https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg
[![Updates](https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg)](https://pyup.io/repos/github/cookiecutter/cookiecutter-django/)
.. image:: https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg :target: https://pyup.io/repos/github/cookiecutter/cookiecutter-django/ :alt: Updates
<a href="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/"><img src="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg(Updates)!:https://pyup.io/repos/github/cookiecutter/cookiecutter-django/
{<img src="https://pyup.io/repos/github/cookiecutter/cookiecutter-django/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/cookiecutter/cookiecutter-django/]