
cloud.projectdiscovery.io/public/CVE-2022-34265
Preview meta tags from the cloud.projectdiscovery.io website.
Linked Hostnames
1Thumbnail
Search Engine Appearance
Django - SQL injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Bing
Django - SQL injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
DuckDuckGo

Django - SQL injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
General Meta Tags
9- titleDjango - SQL injection
- charsetutf-8
- viewportwidth=device-width, initial-scale=1
- next-size-adjust
- descriptionAn issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Open Graph Meta Tags
6- og:titleDjango - SQL injection
- og:descriptionAn issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
- og:urlhttps://cloud.projectdiscovery.io/public/CVE-2022-34265
- og:image:typeimage/png
- og:imagehttps://cloud.projectdiscovery.io/public/CVE-2022-34265/opengraph-image?78a6a002a5628982
Twitter Meta Tags
5- twitter:cardsummary_large_image
- twitter:titleDjango - SQL injection
- twitter:descriptionAn issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
- twitter:image:typeimage/png
- twitter:imagehttps://cloud.projectdiscovery.io/public/CVE-2022-34265/twitter-image?70da90373ba63a1b
Link Tags
18- apple-touch-icon/apple-touch-icon.png
- icon/favicon-32x32.png
- icon/favicon-16x16.png
- manifest/site.webmanifest
- mask-icon/safari-pinned-tab.svg
Links
8- https://cloud.projectdiscovery.io
- https://cloud.projectdiscovery.io/assets
- https://cloud.projectdiscovery.io/assets/inventory
- https://cloud.projectdiscovery.io/library
- https://cloud.projectdiscovery.io/results?vuln_status=open%2Ctriaged%2Cfix_in_progress&filter=vulns&severity=critical%2Chigh%2Cmedium%2Clow%2Cunknown&referrer=sidebar