Python/django/3.2.22
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause
AND
BSD
2 Security Vulnerabilities
Django potential denial of service vulnerability in UsernameField on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2023-46695
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://github.com/django/django/commit/048a9ebb6ea468426cb4e57c71572cbbd975517f
- https://github.com/django/django/commit/4965bfdde2e5a5c883685019e57d123a3368a75e
- https://github.com/django/django/commit/f9a7fb8466a7ba4857eaf930099b5258f3eafb2b
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-222.yaml
- https://github.com/advisories/GHSA-qmf9-6jqf-j8fq
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Regular expression denial-of-service in Django
- https://nvd.nist.gov/vuln/detail/CVE-2024-27351
- https://docs.djangoproject.com/en/5.0/releases/security
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml
- https://github.com/advisories/GHSA-vm8q-m57g-pff3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- http://www.openwall.com/lists/oss-security/2024/03/04/1
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
400 Other Versions
Version | License | Security | Released | |
---|---|---|---|---|
2.2.14 | BSD | 7 | 2020-07-01 - 04:49 | about 5 years |
2.2.13 | BSD | 7 | 2020-06-03 - 09:36 | about 5 years |
2.2.12 | BSD | 9 | 2020-04-01 - 07:59 | about 5 years |
2.2.11 | BSD | 9 | 2020-03-04 - 09:31 | over 5 years |
2.2.10 | BSD | 10 | 2020-02-03 - 09:50 | over 5 years |
2.2.9 | BSD | 10 | 2019-12-18 - 08:59 | over 5 years |
2.2.8 | BSD | 10 | 2019-12-02 - 08:57 | over 5 years |
2.2.7 | BSD | 11 | 2019-11-04 - 08:33 | over 5 years |
2.2.6 | BSD | 11 | 2019-10-01 - 08:36 | over 5 years |
2.2.5 | BSD | 11 | 2019-09-02 - 07:18 | almost 6 years |
2.2.4 | BSD | 11 | 2019-08-01 - 09:04 | almost 6 years |
2.2.3 | BSD | 15 | 2019-07-01 - 07:19 | about 6 years |
2.2.2 | BSD | 16 | 2019-06-03 - 10:11 | about 6 years |
2.2.1 | BSD | 18 | 2019-05-01 - 06:57 | about 6 years |
2.2 | BSD | 18 | 2019-04-01 - 12:47 | about 6 years |
2.1.15 | BSD | 2 | 2019-12-02 - 08:57 | over 5 years |
2.1.14 | BSD | 3 | 2019-11-04 - 08:33 | over 5 years |
2.1.13 | BSD | 3 | 2019-10-01 - 08:36 | over 5 years |
2.1.12 | BSD | 3 | 2019-09-02 - 07:18 | almost 6 years |
2.1.11 | BSD | 3 | 2019-08-01 - 09:04 | almost 6 years |
2.1.10 | BSD | 7 | 2019-07-01 - 07:19 | about 6 years |
2.1.9 | BSD | 8 | 2019-06-03 - 10:11 | about 6 years |
2.1.8 | BSD | 10 | 2019-04-01 - 09:18 | about 6 years |
2.1.7 | BSD | 10 | 2019-02-11 - 15:10 | over 6 years |
2.1.5 | BSD | 11 | 2019-01-04 - 13:52 | over 6 years |
2.1.4 | BSD | 12 | 2018-12-03 - 17:02 | over 6 years |
2.1.3 | BSD | 12 | 2018-11-01 - 14:36 | over 6 years |
2.1.2 | BSD | 12 | 2018-10-01 - 09:22 | over 6 years |
2.1.1 | BSD | 13 | 2018-08-31 - 08:42 | almost 7 years |
2.1 | BSD | 13 | 2018-08-01 - 14:11 | almost 7 years |
2.0.13 | BSD | 3 | 2019-02-12 - 10:50 | over 6 years |
2.0.12 | BSD | 3 | 2019-02-11 - 15:10 | over 6 years |
2.0.10 | BSD | 4 | 2019-01-04 - 14:03 | over 6 years |
2.0.9 | BSD | 5 | 2018-10-01 - 09:22 | over 6 years |
2.0.8 | BSD | 5 | 2018-08-01 - 13:51 | almost 7 years |
2.0.7 | BSD | 6 | 2018-07-02 - 09:02 | almost 7 years |
2.0.6 | BSD | 6 | 2018-06-01 - 15:32 | about 7 years |
2.0.5 | BSD | 6 | 2018-05-02 - 01:34 | about 7 years |
2.0.4 | BSD | 6 | 2018-04-03 - 02:39 | about 7 years |
2.0.3 | BSD | 6 | 2018-03-06 - 14:05 | over 7 years |
2.0.2 | BSD | 8 | 2018-02-01 - 14:30 | over 7 years |
2.0.1 | BSD | 8 | 2018-01-02 - 00:50 | over 7 years |
2.0 | BSD | 8 | 2017-12-02 - 15:11 | over 7 years |
1.11.29 | BSD | 1 | 2020-03-04 - 09:31 | over 5 years |
1.11.28 | BSD | 2 | 2020-02-03 - 09:50 | over 5 years |
1.11.27 | BSD | 3 | 2019-12-18 - 08:59 | over 5 years |
1.11.26 | BSD | 4 | 2019-11-04 - 08:33 | over 5 years |
1.11.25 | BSD | 4 | 2019-10-01 - 08:36 | over 5 years |
1.11.24 | BSD | 4 | 2019-09-02 - 07:18 | almost 6 years |
1.11.23 | BSD | 4 | 2019-08-01 - 09:04 | almost 6 years |