Description
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Statistics Cross-Site Scripting (12.6.5)
WordPress Plugin Cart66 Lite::WordPress Ecommerce Multiple Vulnerabilities (1.5.3)
WordPress Plugin WP REST API (WP API) Information Disclosure (1.2)
WordPress 2.0.9 Multiple Vulnerabilities (2.0 - 2.0.9)
GlassFish Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-3250)