<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ryu22eBlog</title><link>https://ryu22e.org/en/</link><description>Recent content on ryu22eBlog</description><generator>Hugo -- 0.143.1</generator><language>en</language><copyright>2013-2025 Ryuji Tsutsui</copyright><lastBuildDate>Mon, 28 Sep 2020 10:30:00 +0900</lastBuildDate><atom:link href="https://ryu22e.org/en/index.xml" rel="self" type="application/rss+xml"/><item><title>On Django Vulnerabilities CVE-2020-24583 and CVE-2020-24584 commentary</title><link>https://ryu22e.org/en/posts/2020/09/28/django-cve-2020-24583-and-cve-2020-24584/</link><pubDate>Mon, 28 Sep 2020 10:30:00 +0900</pubDate><guid>https://ryu22e.org/en/posts/2020/09/28/django-cve-2020-24583-and-cve-2020-24584/</guid><description>&lt;p>&lt;a href="https://ryu22e.org/posts/2020/09/28/django-cve-2020-24583-and-cve-2020-24584/">Japanese edition&lt;/a>&lt;/p>
&lt;p>This article describes the Django vulnerabilities CVE-2020-24583 and CVE-2020-24584, which were fixed on September 1, 2020.&lt;/p>
&lt;figure>
&lt;img loading="lazy" src="https://ryu22e.org/media/2020/09/28/django-cve-2020-24583-and-cve-2020-24584.jpg"
alt="This vulnerability can give extra permissions to directories created by the application"/> &lt;figcaption>
&lt;p>This vulnerability can give extra permissions to directories created by the application&lt;/p>
&lt;/figcaption>
&lt;/figure>
&lt;p>See below for release information on the official website:&lt;/p>
&lt;p>&lt;a href="https://www.djangoproject.com/weblog/2020/sep/01/security-releases/">Django security releases issued: 3.1.1, 3.0.10 and 2.2.16 | Weblog | Django&lt;/a>&lt;/p></description></item><item><title>On Django Vulnerabilities CVE-2020-13254 and CVE-2020-13596 commentary</title><link>https://ryu22e.org/en/posts/2020/06/09/django-cve-2020-13254-and-cve-2020-13596/</link><pubDate>Tue, 09 Jun 2020 10:30:00 +0900</pubDate><guid>https://ryu22e.org/en/posts/2020/06/09/django-cve-2020-13254-and-cve-2020-13596/</guid><description>&lt;p>&lt;a href="https://ryu22e.org/posts/2020/06/09/django-cve-2020-13254-and-cve-2020-13596/">Japanese edition&lt;/a>&lt;/p>
&lt;p>This article describes the Django vulnerabilities CVE-2020-13254 and CVE-2020-13596, which were fixed on June 3, 2020.&lt;/p>
&lt;figure>
&lt;img loading="lazy" src="https://ryu22e.org/media/2020/06/09/CVE-2020-1359.en.png"
alt="CVE-2020-13254 is a potential data breach"/> &lt;figcaption>
&lt;p>CVE-2020-13254 is a potential data breach&lt;/p>
&lt;/figcaption>
&lt;/figure>
&lt;figure>
&lt;img loading="lazy" src="https://ryu22e.org/media/2020/06/09/CVE-2020-13596.png"
alt="CVE-2020-13596 is a vulnerability related to XSS"/> &lt;figcaption>
&lt;p>CVE-2020-13596 is a vulnerability related to XSS&lt;/p>
&lt;/figcaption>
&lt;/figure>
&lt;p>See below for release information on the official website:&lt;/p>
&lt;p>&lt;a href="https://www.djangoproject.com/weblog/2020/jun/03/security-releases/">Django security releases issued: 3.0.7 and 2.2.13 | Weblog | Django&lt;/a>&lt;/p></description></item><item><title>Description the Django Vulnerability CVE-2020-7471</title><link>https://ryu22e.org/en/posts/2020/02/06/django-cve-2020-7471/</link><pubDate>Thu, 06 Feb 2020 10:30:00 +0900</pubDate><guid>https://ryu22e.org/en/posts/2020/02/06/django-cve-2020-7471/</guid><description>&lt;p>&lt;a href="https://ryu22e.org/posts/2020/02/06/django-cve-2020-7471/">Japanese edition&lt;/a>&lt;/p>
&lt;p>This article describes the Django vulnerability CVE-2020-7471, which was fixed on February 3, 2020.&lt;/p>
&lt;figure>
&lt;img loading="lazy" src="https://ryu22e.org/media/2020/02/06/sql-injection.png"
alt="This vulnerability allows SQL injection"/> &lt;figcaption>
&lt;p>This vulnerability allows SQL injection&lt;/p>
&lt;/figcaption>
&lt;/figure>
&lt;p>Please refer to the following for release information on the official website.&lt;/p>
&lt;p>&lt;a href="https://www.djangoproject.com/weblog/2020/feb/03/security-releases/">Django security releases issued: 3.0.3, 2.2.10, and 1.11.28 | Weblog | Django&lt;/a>&lt;/p></description></item><item><title>Description the Django Vulnerability CVE-2019-19844</title><link>https://ryu22e.org/en/posts/2019/12/25/django-cve-2019-19844/</link><pubDate>Wed, 25 Dec 2019 10:30:00 +0900</pubDate><guid>https://ryu22e.org/en/posts/2019/12/25/django-cve-2019-19844/</guid><description>&lt;p>&lt;a href="https://ryu22e.org/posts/2019/12/25/django-cve-2019-19844/">Japanese edition&lt;/a>&lt;/p>
&lt;p>This article describes the Django vulnerability CVE-2019-19844, which was fixed on December 18, 2019.&lt;/p>
&lt;figure>
&lt;img loading="lazy" src="https://ryu22e.org/media/2019/12/25/account-hijack.png"
alt="This vulnerability allows for account hijacking"/> &lt;figcaption>
&lt;p>This vulnerability allows for account hijacking&lt;/p>
&lt;/figcaption>
&lt;/figure>
&lt;p>Please refer to the following for release information on the official website.&lt;/p>
&lt;p>&lt;a href="https://www.djangoproject.com/weblog/2019/dec/18/security-releases/">Django security releases issued: 3.0.1, 2.2.9, and 1.11.27 | Weblog | Django&lt;/a>&lt;/p></description></item><item><title>Privacy Policy(About Google Analytics adopted by ryu22eBlog)</title><link>https://ryu22e.org/en/privacy-policy/</link><pubDate>Sat, 14 Dec 2013 00:00:00 +0900</pubDate><guid>https://ryu22e.org/en/privacy-policy/</guid><description>&lt;!-- textlint-disable -->
&lt;p>ryu22eBlog (hereinafter called &amp;ldquo;this site&amp;rdquo;) uses Google&amp;rsquo;s service Google Analytics to acquire user information.&lt;/p>
&lt;p>Google Analytics uses first-party cookies to collect anonymous traffic data.&lt;/p>
&lt;p>First-party cookies store the following information.&lt;/p>
&lt;ul>
&lt;li>The start time of the current session&lt;/li>
&lt;li>Whether you have visited our site in the past&lt;/li>
&lt;li>From which site you accessed the site&lt;/li>
&lt;/ul>
&lt;p>In this site, we use the information obtained by Google Analytics to the extent necessary to achieve the following usage purposes.&lt;/p></description></item></channel></rss>