Python/django/3.2.22
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause
AND
BSD
2 Security Vulnerabilities
Django potential denial of service vulnerability in UsernameField on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2023-46695
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://github.com/django/django/commit/048a9ebb6ea468426cb4e57c71572cbbd975517f
- https://github.com/django/django/commit/4965bfdde2e5a5c883685019e57d123a3368a75e
- https://github.com/django/django/commit/f9a7fb8466a7ba4857eaf930099b5258f3eafb2b
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-222.yaml
- https://github.com/advisories/GHSA-qmf9-6jqf-j8fq
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Regular expression denial-of-service in Django
- https://nvd.nist.gov/vuln/detail/CVE-2024-27351
- https://docs.djangoproject.com/en/5.0/releases/security
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml
- https://github.com/advisories/GHSA-vm8q-m57g-pff3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- http://www.openwall.com/lists/oss-security/2024/03/04/1
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
400 Other Versions
Version | License | Security | Released | |
---|---|---|---|---|
1.5.1 | BSD | 16 | 2013-03-28 - 20:57 | over 12 years |
1.5 | BSD | 16 | 2013-02-26 - 19:30 | over 12 years |
1.4.22 | BSD | 10 | 2015-08-18 - 17:22 | almost 10 years |
1.4.21 | BSD | 11 | 2015-07-08 - 19:56 | almost 10 years |
1.4.20 | BSD | 13 | 2015-03-19 - 00:03 | over 10 years |
1.4.19 | BSD | 13 | 2015-01-27 - 17:11 | over 10 years |
1.4.18 | BSD | 13 | 2015-01-13 - 18:54 | over 10 years |
1.4.17 | BSD | 16 | 2015-01-03 - 02:20 | over 10 years |
1.4.16 | BSD | 16 | 2014-10-22 - 16:37 | over 10 years |
1.4.15 | BSD | 16 | 2014-09-02 - 20:44 | almost 11 years |
1.4.14 | BSD | 16 | 2014-08-20 - 20:01 | almost 11 years |
1.4.13 | BSD | 19 | 2014-05-14 - 18:27 | about 11 years |
1.4.12 | BSD | 21 | 2014-04-28 - 20:30 | about 11 years |
1.4.11 | BSD | 21 | 2014-04-21 - 22:40 | about 11 years |
1.4.10 | BSD | 23 | 2013-11-06 - 14:21 | over 11 years |
1.4.9 | BSD | 23 | 2013-10-25 - 04:38 | over 11 years |
1.4.8 | BSD | 23 | 2013-09-15 - 06:22 | almost 12 years |
1.4.7 | BSD | 24 | 2013-09-11 - 01:18 | almost 12 years |
1.4.6 | BSD | 25 | 2013-08-13 - 16:52 | almost 12 years |
1.4.5 | BSD | 26 | 2013-02-20 - 19:54 | over 12 years |
1.4.4 | BSD | 26 | 2013-02-19 - 20:27 | over 12 years |
1.4.3 | BSD | 28 | 2012-12-10 - 21:46 | over 12 years |
1.4.2 | BSD | 28 | 2012-10-17 - 22:18 | over 12 years |
1.4.1 | BSD | 29 | 2012-07-30 - 22:48 | almost 13 years |
1.4 | BSD | 30 | 2012-03-23 - 18:00 | over 13 years |
1.3.7 | BSD | 20 | 2013-02-20 - 20:03 | over 12 years |
1.3.6 | BSD | 20 | 2013-02-19 - 20:32 | over 12 years |
1.3.5 | BSD | 22 | 2012-12-10 - 21:39 | over 12 years |
1.3.4 | BSD | 22 | 2013-03-05 - 22:33 | over 12 years |
1.3.3 | BSD | 23 | 2012-08-01 - 22:08 | almost 13 years |
1.3.2 | BSD | 23 | 2012-07-30 - 23:02 | almost 13 years |
1.3.1 | BSD | 25 | 2011-09-10 - 03:36 | almost 14 years |
1.3 | BSD | 28 | 2011-03-23 - 06:09 | over 14 years |
1.2.7 | BSD | 22 | 2011-09-11 - 03:05 | almost 14 years |
1.2.6 | BSD | 26 | 2011-09-10 - 03:42 | almost 14 years |
1.2.5 | BSD | 26 | 2011-02-09 - 04:08 | over 14 years |
1.2.4 | BSD | 29 | 2010-12-23 - 05:15 | over 14 years |
1.2.3 | BSD | 29 | 2010-09-11 - 08:50 | almost 15 years |
1.2.2 | BSD | 29 | 2010-09-09 - 02:41 | almost 15 years |
1.2.1 | BSD | 30 | 2010-05-24 - 21:19 | about 15 years |
1.2 | BSD | 30 | 2010-05-17 - 20:04 | about 15 years |
1.1.4 | BSD | 24 | 2011-02-09 - 04:13 | over 14 years |
1.1.3 | BSD | 27 | 2010-12-23 - 05:14 | over 14 years |
1.1.2 | BSD | 29 | 1970-01-01 - 00:00 | over 55 years |
1.1.1 | BSD | 29 | 1970-01-01 - 00:00 | over 55 years |
1.1 | BSD | 29 | 1970-01-01 - 00:00 | over 55 years |
1.0.4 | BSD | 26 | 1970-01-01 - 00:00 | over 55 years |
1.0.3 | BSD | 26 | 1970-01-01 - 00:00 | over 55 years |
1.0.2 | BSD | 26 | 1970-01-01 - 00:00 | over 55 years |
1.0.1 | BSD | 26 | 1970-01-01 - 00:00 | over 55 years |