Python/django/3.2.22
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause
AND
BSD
2 Security Vulnerabilities
Django potential denial of service vulnerability in UsernameField on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2023-46695
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://github.com/django/django/commit/048a9ebb6ea468426cb4e57c71572cbbd975517f
- https://github.com/django/django/commit/4965bfdde2e5a5c883685019e57d123a3368a75e
- https://github.com/django/django/commit/f9a7fb8466a7ba4857eaf930099b5258f3eafb2b
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-222.yaml
- https://github.com/advisories/GHSA-qmf9-6jqf-j8fq
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Regular expression denial-of-service in Django
- https://nvd.nist.gov/vuln/detail/CVE-2024-27351
- https://docs.djangoproject.com/en/5.0/releases/security
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml
- https://github.com/advisories/GHSA-vm8q-m57g-pff3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- http://www.openwall.com/lists/oss-security/2024/03/04/1
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
400 Other Versions
Version | License | Security | Released | |
---|---|---|---|---|
1.11.22 | BSD | 8 | 2019-07-01 - 07:19 | about 6 years |
1.11.21 | BSD | 9 | 2019-06-03 - 10:10 | about 6 years |
1.11.20 | BSD | 10 | 2019-02-11 - 15:10 | over 6 years |
1.11.18 | BSD | 11 | 2019-01-04 - 14:10 | over 6 years |
1.11.17 | BSD | 12 | 2018-12-03 - 17:02 | over 6 years |
1.11.16 | BSD | 12 | 2018-10-01 - 09:22 | over 6 years |
1.11.15 | BSD | 12 | 2018-08-01 - 13:45 | almost 7 years |
1.11.14 | BSD | 12 | 2018-07-02 - 09:01 | almost 7 years |
1.11.13 | BSD | 12 | 2018-05-02 - 01:54 | about 7 years |
1.11.12 | BSD | 12 | 2018-04-03 - 02:45 | about 7 years |
1.11.11 | BSD | 12 | 2018-03-06 - 14:15 | over 7 years |
1.11.10 | BSD | 14 | 2018-02-01 - 14:40 | over 7 years |
1.11.9 | BSD | 15 | 2018-01-02 - 01:01 | over 7 years |
1.11.8 | BSD | 15 | 2017-12-02 - 14:20 | over 7 years |
1.11.7 | BSD | 14 | 2017-11-02 - 01:26 | over 7 years |
1.11.6 | BSD | 14 | 2017-10-05 - 18:21 | over 7 years |
1.11.5 | BSD | 14 | 2017-09-05 - 15:18 | almost 8 years |
1.11.4 | BSD | 15 | 2017-08-01 - 12:24 | almost 8 years |
1.11.3 | BSD | 15 | 2017-07-01 - 23:24 | almost 8 years |
1.11.2 | BSD | 15 | 2017-06-01 - 16:47 | about 8 years |
1.11.1 | BSD | 15 | 2017-05-06 - 13:26 | about 8 years |
1.11 | BSD | 15 | 2017-04-04 - 15:59 | about 8 years |
1.10.8 | BSD | 5 | 2017-09-05 - 15:31 | almost 8 years |
1.10.7 | BSD | 6 | 2017-04-04 - 14:27 | about 8 years |
1.10.6 | BSD | 8 | 2017-03-01 - 13:37 | over 8 years |
1.10.5 | BSD | 8 | 2017-01-04 - 19:22 | over 8 years |
1.10.4 | BSD | 8 | 2016-12-01 - 23:46 | over 8 years |
1.10.3 | BSD | 8 | 2016-11-01 - 13:56 | over 8 years |
1.10.2 | BSD | 10 | 2016-10-01 - 20:05 | over 8 years |
1.10.1 | BSD | 10 | 2016-09-01 - 23:17 | almost 9 years |
1.10 | BSD | 10 | 2016-08-01 - 18:32 | almost 9 years |
1.9.13 | BSD | 5 | 2017-04-04 - 14:14 | about 8 years |
1.9.12 | BSD | 7 | 2016-12-01 - 23:16 | over 8 years |
1.9.11 | BSD | 7 | 2016-11-01 - 14:02 | over 8 years |
1.9.10 | BSD | 9 | 2016-09-26 - 18:32 | almost 9 years |
1.9.9 | BSD | 10 | 2016-08-01 - 18:10 | almost 9 years |
1.9.8 | BSD | 10 | 2016-07-18 - 18:19 | almost 9 years |
1.9.7 | BSD | 11 | 2016-06-04 - 23:43 | about 9 years |
1.9.6 | BSD | 11 | 2016-05-02 - 22:33 | about 9 years |
1.9.5 | BSD | 11 | 2016-04-01 - 17:47 | about 9 years |
1.9.4 | BSD | 11 | 2016-03-05 - 14:31 | over 9 years |
1.9.3 | BSD | 11 | 2016-03-01 - 17:00 | over 9 years |
1.9.2 | BSD | 12 | 2016-02-01 - 17:17 | over 9 years |
1.9.1 | BSD | 13 | 2016-01-02 - 13:50 | over 9 years |
1.9 | BSD | 13 | 2015-12-01 - 23:55 | over 9 years |
1.8.19 | BSD | 5 | 2018-03-06 - 14:22 | over 7 years |
1.8.18 | BSD | 7 | 2017-04-04 - 14:07 | about 8 years |
1.8.17 | BSD | 9 | 2016-12-01 - 23:03 | over 8 years |
1.8.16 | BSD | 9 | 2016-11-01 - 14:09 | over 8 years |
1.8.15 | BSD | 11 | 2016-09-26 - 18:30 | almost 9 years |