cloud.projectdiscovery.io/public/CVE-2022-34265

Preview meta tags from the cloud.projectdiscovery.io website.

Linked Hostnames

1

Thumbnail

Search Engine Appearance

Google

https://cloud.projectdiscovery.io/public/CVE-2022-34265

Django - SQL injection

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.



Bing

Django - SQL injection

https://cloud.projectdiscovery.io/public/CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.



DuckDuckGo

https://cloud.projectdiscovery.io/public/CVE-2022-34265

Django - SQL injection

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

  • General Meta Tags

    9
    • title
      Django - SQL injection
    • charset
      utf-8
    • viewport
      width=device-width, initial-scale=1
    • next-size-adjust
    • description
      An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
  • Open Graph Meta Tags

    6
    • og:title
      Django - SQL injection
    • og:description
      An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
    • og:url
      https://cloud.projectdiscovery.io/public/CVE-2022-34265
    • og:image:type
      image/png
    • og:image
      https://cloud.projectdiscovery.io/public/CVE-2022-34265/opengraph-image?78a6a002a5628982
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:title
      Django - SQL injection
    • twitter:description
      An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
    • twitter:image:type
      image/png
    • twitter:image
      https://cloud.projectdiscovery.io/public/CVE-2022-34265/twitter-image?70da90373ba63a1b
  • Link Tags

    18
    • apple-touch-icon
      /apple-touch-icon.png
    • icon
      /favicon-32x32.png
    • icon
      /favicon-16x16.png
    • manifest
      /site.webmanifest
    • mask-icon
      /safari-pinned-tab.svg

Links

8