Description
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
Remediation
References
Related Vulnerabilities
WordPress Plugin Spotlight Social Feeds [Block, Shortcode, and Widget] Security Bypass (0.10.1)
PostgreSQL CVE-2017-7547 Vulnerability (CVE-2017-7547)
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-11327)
ownCloud Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-2044)
WordPress Plugin Dynamic Content for Elementor Remote Code Execution (1.9.5.6)