जमा करें #790289: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentialsजानकारी

शीर्षकliangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
विवरणDjangoBlog through x.x.x.x enables Django DEBUG mode by default and uses hardcoded database credentials (root/root) as fallback values in djangoblog/settings.py. Deployments that omit environment variable configuration expose detailed error pages (stack traces, settings, local variables) and use trivially guessable database credentials.
स्रोत⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-12-DEBUG-Enabled-Hardcoded-DB-Creds.md
उपयोगकर्ता
 Dem0 (UID 82596)
सबमिशन26/03/2026 05:26 PM (25 दिन पहले)
संयम19/04/2026 06:06 PM (24 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि358245 [liangliangyy DjangoBlog तक 2.1.0.0 Setting djangoblog/settings.py USER/PASSWORD कमजोर प्रमाणीकरण]
अंक18

Want to know what is going to be exploited?

We predict KEV entries!