Python/django/4.1.7


A high-level Python web framework that encourages rapid development and clean, pragmatic design.

https://pypi.org/project/django
BSD-3-Clause AND BSD

6 Security Vulnerabilities

Django Denial of service vulnerability in django.utils.encoding.uri_to_iri

Published date: 2023-11-03T06:36:29Z
CVE: CVE-2023-41164
Links:

In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uritoiri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.

Affected versions: ["4.2", "4.2.1", "4.2.2", "4.2.3", "4.2.4", "4.1", "4.1.1", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.1.6", "4.1.7", "4.1.8", "4.1.9", "4.1.10", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16", "3.2.17", "3.2.18", "3.2.19", "3.2.20"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.

Published date: 2025-11-05T15:31:07Z
CVE: CVE-2025-64459
Links:

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.

Affected versions: ["1.10rc1", "1.11.12", "1.11.14", "1.11.18", "1.11.23", "1.11.8", "1.11.9", "1.11rc1", "1.2", "1.2.2", "1.3.4", "1.3.7", "1.4.22", "1.4.7", "1.4.8", "1.6.10", "1.7.10", "1.7.2", "1.8", "1.8.16", "1.8.18", "1.8.6", "1.8.9", "1.8a1", "1.8b1", "1.8c1", "1.9.11", "1.9.9", "2.1.1", "2.1.14", "2.1.4", "2.2.18", "3.0.7", "3.1.6", "1.0.1", "1.0.4", "1.10", "1.11.1", "1.11.22", "1.11.26", "1.11.27", "1.2.5", "1.4", "1.4.10", "1.4.12", "1.5.5", "1.5.6", "1.6.1", "1.6.3", "1.6.4", "1.6.6", "1.8.1", "1.8.10", "1.8.13", "1.8.15", "1.8.2", "1.9", "1.9rc2", "2.0", "2.0.1", "2.0.4", "2.0a1", "2.1.3", "2.2.12", "3.0.1", "3.0.14", "3.0.3", "3.0.8", "3.2", "1.0.3", "1.10b1", "1.11.15", "1.11.24", "1.2.4", "1.4.16", "1.4.17", "1.7.11", "1.7.6", "1.7.7", "1.7.8", "1.7.9", "1.8.17", "1.8.5", "1.8b2", "1.9.8", "2.0.3", "2.0.5", "2.1.2", "2.1.8", "2.1a1", "2.2.17", "3.0.4", "3.0.6", "3.0.9", "3.1a1", "3.1rc1", "1.0.2", "1.1.3", "1.1.4", "1.10.1", "1.11.3", "1.2.6", "1.3", "1.4.19", "1.5.1", "1.5.3", "1.5.7", "1.6", "1.6.11", "1.9.1", "1.9b1", "2.1.13", "2.1.15", "2.2.9", "3.0.10", "3.0.11", "3.1.7", "3.1.8", "3.2rc1", "1.10.5", "1.10.8", "1.10a1", "1.11", "1.11.2", "1.11.20", "1.11.25", "1.11.4", "1.11.5", "1.2.7", "1.4.11", "1.4.13", "1.4.3", "1.4.9", "1.5.12", "1.5.2", "1.6.5", "1.6.8", "1.7.1", "1.1.2", "1.10.4", "1.10.6", "1.11.29", "1.3.5", "1.4.14", "1.4.18", "1.4.20", "1.4.5", "1.5.10", "1.6.7", "1.7.3", "1.7.4", "1.8.11", "1.1.1", "1.10.2", "1.11.10", "1.11.11", "1.11.16", "1.11.17", "1.11.7", "1.3.3", "1.3.6", "1.4.15", "1.4.21", "1.5.4", "1.6.2", "1.6.9", "1.1", "1.10.3", "1.10.7", "1.11.13", "1.11.21", "1.11.28", "1.11.6", "1.11a1", "1.11b1", "1.2.1", "1.2.3", "1.3.1", "1.3.2", "1.4.1", "1.4.2", "1.4.4", "1.4.6", "1.5", "1.5.11", "1.5.8", "1.5.9", "1.7", "1.7.5", "1.9.13", "1.9.2", "1.9.3", "1.9.4", "2.0.12", "2.0.7", "2.1.9", "2.2.11", "2.2.15", "2.2.2", "3.0", "3.0.5", "3.1", "3.1.2", "3.1.4", "1.8.12", "1.8.19", "1.8.7", "1.8.8", "1.9.10", "1.9.12", "1.9.5", "1.9rc1", "2.0.8", "2.0.9", "2.0b1", "2.1", "2.1.5", "2.2.10", "2.2.16", "2.2.19", "2.2.20", "2.2.6", "2.2.8", "3.0.13", "3.0b1", "3.1.5", "3.2a1", "1.8.14", "1.8.4", "2.0.13", "2.0.2", "2.0.6", "2.0rc1", "2.1.10", "2.1.7", "2.1b1", "2.2", "2.2rc1", "3.0.12", "3.0a1", "3.1.1", "3.1.3", "1.8.3", "1.9.6", "1.9.7", "1.9a1", "2.0.10", "2.1.11", "2.1.12", "2.1rc1", "2.2.1", "2.2.13", "2.2.14", "2.2.3", "2.2.4", "2.2.5", "2.2.7", "2.2a1", "2.2b1", "3.0.2", "3.0rc1", "3.1b1", "3.2b1", "3.1.9", "2.2.21", "3.2.1", "2.2.22", "3.1.10", "3.2.2", "3.1.11", "3.2.3", "2.2.23", "3.1.12", "2.2.24", "3.2.4", "3.1.13", "3.2.5", "3.2.6", "3.2.7", "4.0a1", "3.2.8", "4.0b1", "3.2.9", "4.0rc1", "2.2.25", "3.2.10", "3.1.14", "4.0", "3.2.11", "4.0.1", "2.2.26", "2.2.27", "3.2.12", "4.0.2", "4.0.3", "3.2.13", "4.0.4", "2.2.28", "4.1a1", "4.0.5", "4.1b1", "3.2.14", "4.0.6", "4.1rc1", "3.2.15", "4.0.7", "4.1", "4.1.1", "3.2.16", "4.0.8", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.2a1", "4.1.6", "3.2.17", "4.0.9", "4.0.10", "3.2.18", "4.1.7", "4.2b1", "4.2rc1", "4.2", "4.1.8", "4.1.9", "3.2.19", "4.2.1", "4.2.2", "3.2.20", "4.1.10", "4.2.3", "4.2.4", "3.2.21", "4.1.11", "4.2.5", "3.2.22", "4.1.12", "4.2.6", "3.2.23", "4.1.13", "4.2.7", "4.2.8", "4.2.9", "3.2.24", "4.2.10", "3.2.25", "4.2.11", "4.2.12", "4.2.13", "4.2.14", "4.2.15", "4.2.16", "4.2.17", "4.2.18", "4.2.19", "4.2.20", "4.2.21", "4.2.22", "4.2.23", "4.2.24", "4.2.25", "5.0a1", "5.0b1", "5.0rc1", "5.0", "5.0.1", "5.0.2", "5.0.3", "5.0.4", "5.0.5", "5.0.6", "5.1a1", "5.1b1", "5.0.7", "5.1rc1", "5.0.8", "5.1", "5.1.1", "5.0.9", "5.1.2", "5.1.3", "5.0.10", "5.1.4", "5.0.11", "5.1.5", "5.0.12", "5.1.6", "5.1.7", "5.0.13", "5.1.8", "5.0.14", "5.1.9", "5.1.10", "5.1.11", "5.1.12", "5.1.13", "5.2a1", "5.2b1", "5.2rc1", "5.2", "5.2.1", "5.2.2", "5.2.3", "5.2.4", "5.2.5", "5.2.6", "5.2.7"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

Django Denial-of-service in django.utils.text.Truncator

Published date: 2023-11-03T06:36:30Z
CVE: CVE-2023-43665
Links:

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatecharshtml and truncatewordshtml template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

Affected versions: ["4.2", "4.2.1", "4.2.2", "4.2.3", "4.2.4", "4.2.5", "4.1", "4.1.1", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.1.6", "4.1.7", "4.1.8", "4.1.9", "4.1.10", "4.1.11", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16", "3.2.17", "3.2.18", "3.2.19", "3.2.20", "3.2.21"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

Django has regular expression denial of service vulnerability in EmailValidator/URLValidator

Published date: 2023-07-03T15:30:45Z
CVE: CVE-2023-36053
Links:

In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.

Affected versions: ["3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16", "3.2.17", "3.2.18", "3.2.19", "4.0", "4.0.1", "4.0.2", "4.0.3", "4.0.4", "4.1a1", "4.0.5", "4.1b1", "4.0.6", "4.1rc1", "4.0.7", "4.1", "4.1.1", "4.0.8", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.0.9", "4.1.6", "4.0.10", "4.1.7", "4.1.8", "4.1.9", "4.2", "4.2.1", "4.2.2"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

Django potential denial of service vulnerability in UsernameField on Windows

Published date: 2023-11-02T06:30:25Z
CVE: CVE-2023-46695
Links:

An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.

Affected versions: ["4.2", "4.2.1", "4.2.2", "4.2.3", "4.2.4", "4.2.5", "4.2.6", "4.1", "4.1.1", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.1.6", "4.1.7", "4.1.8", "4.1.9", "4.1.10", "4.1.11", "4.1.12", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16", "3.2.17", "3.2.18", "3.2.19", "3.2.20", "3.2.21", "3.2.22"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows

Published date: 2025-11-05T15:31:07Z
CVE: CVE-2025-64458
Links:

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

Affected versions: ["1.10rc1", "1.11.12", "1.11.14", "1.11.18", "1.11.23", "1.11.8", "1.11.9", "1.11rc1", "1.2", "1.2.2", "1.3.4", "1.3.7", "1.4.22", "1.4.7", "1.4.8", "1.6.10", "1.7.10", "1.7.2", "1.8", "1.8.16", "1.8.18", "1.8.6", "1.8.9", "1.8a1", "1.8b1", "1.8c1", "1.9.11", "1.9.9", "2.1.1", "2.1.14", "2.1.4", "2.2.18", "3.0.7", "3.1.6", "1.0.1", "1.0.4", "1.10", "1.11.1", "1.11.22", "1.11.26", "1.11.27", "1.2.5", "1.4", "1.4.10", "1.4.12", "1.5.5", "1.5.6", "1.6.1", "1.6.3", "1.6.4", "1.6.6", "1.8.1", "1.8.10", "1.8.13", "1.8.15", "1.8.2", "1.9", "1.9rc2", "2.0", "2.0.1", "2.0.4", "2.0a1", "2.1.3", "2.2.12", "3.0.1", "3.0.14", "3.0.3", "3.0.8", "3.2", "1.0.3", "1.10b1", "1.11.15", "1.11.24", "1.2.4", "1.4.16", "1.4.17", "1.7.11", "1.7.6", "1.7.7", "1.7.8", "1.7.9", "1.8.17", "1.8.5", "1.8b2", "1.9.8", "2.0.3", "2.0.5", "2.1.2", "2.1.8", "2.1a1", "2.2.17", "3.0.4", "3.0.6", "3.0.9", "3.1a1", "3.1rc1", "1.0.2", "1.1.3", "1.1.4", "1.10.1", "1.11.3", "1.2.6", "1.3", "1.4.19", "1.5.1", "1.5.3", "1.5.7", "1.6", "1.6.11", "1.9.1", "1.9b1", "2.1.13", "2.1.15", "2.2.9", "3.0.10", "3.0.11", "3.1.7", "3.1.8", "3.2rc1", "1.10.5", "1.10.8", "1.10a1", "1.11", "1.11.2", "1.11.20", "1.11.25", "1.11.4", "1.11.5", "1.2.7", "1.4.11", "1.4.13", "1.4.3", "1.4.9", "1.5.12", "1.5.2", "1.6.5", "1.6.8", "1.7.1", "1.1.2", "1.10.4", "1.10.6", "1.11.29", "1.3.5", "1.4.14", "1.4.18", "1.4.20", "1.4.5", "1.5.10", "1.6.7", "1.7.3", "1.7.4", "1.8.11", "1.1.1", "1.10.2", "1.11.10", "1.11.11", "1.11.16", "1.11.17", "1.11.7", "1.3.3", "1.3.6", "1.4.15", "1.4.21", "1.5.4", "1.6.2", "1.6.9", "1.1", "1.10.3", "1.10.7", "1.11.13", "1.11.21", "1.11.28", "1.11.6", "1.11a1", "1.11b1", "1.2.1", "1.2.3", "1.3.1", "1.3.2", "1.4.1", "1.4.2", "1.4.4", "1.4.6", "1.5", "1.5.11", "1.5.8", "1.5.9", "1.7", "1.7.5", "1.9.13", "1.9.2", "1.9.3", "1.9.4", "2.0.12", "2.0.7", "2.1.9", "2.2.11", "2.2.15", "2.2.2", "3.0", "3.0.5", "3.1", "3.1.2", "3.1.4", "1.8.12", "1.8.19", "1.8.7", "1.8.8", "1.9.10", "1.9.12", "1.9.5", "1.9rc1", "2.0.8", "2.0.9", "2.0b1", "2.1", "2.1.5", "2.2.10", "2.2.16", "2.2.19", "2.2.20", "2.2.6", "2.2.8", "3.0.13", "3.0b1", "3.1.5", "3.2a1", "1.8.14", "1.8.4", "2.0.13", "2.0.2", "2.0.6", "2.0rc1", "2.1.10", "2.1.7", "2.1b1", "2.2", "2.2rc1", "3.0.12", "3.0a1", "3.1.1", "3.1.3", "1.8.3", "1.9.6", "1.9.7", "1.9a1", "2.0.10", "2.1.11", "2.1.12", "2.1rc1", "2.2.1", "2.2.13", "2.2.14", "2.2.3", "2.2.4", "2.2.5", "2.2.7", "2.2a1", "2.2b1", "3.0.2", "3.0rc1", "3.1b1", "3.2b1", "3.1.9", "2.2.21", "3.2.1", "2.2.22", "3.1.10", "3.2.2", "3.1.11", "3.2.3", "2.2.23", "3.1.12", "2.2.24", "3.2.4", "3.1.13", "3.2.5", "3.2.6", "3.2.7", "4.0a1", "3.2.8", "4.0b1", "3.2.9", "4.0rc1", "2.2.25", "3.2.10", "3.1.14", "4.0", "3.2.11", "4.0.1", "2.2.26", "2.2.27", "3.2.12", "4.0.2", "4.0.3", "3.2.13", "4.0.4", "2.2.28", "4.1a1", "4.0.5", "4.1b1", "3.2.14", "4.0.6", "4.1rc1", "3.2.15", "4.0.7", "4.1", "4.1.1", "3.2.16", "4.0.8", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.2a1", "4.1.6", "3.2.17", "4.0.9", "4.0.10", "3.2.18", "4.1.7", "4.2b1", "4.2rc1", "4.2", "4.1.8", "4.1.9", "3.2.19", "4.2.1", "4.2.2", "3.2.20", "4.1.10", "4.2.3", "4.2.4", "3.2.21", "4.1.11", "4.2.5", "3.2.22", "4.1.12", "4.2.6", "3.2.23", "4.1.13", "4.2.7", "4.2.8", "4.2.9", "3.2.24", "4.2.10", "3.2.25", "4.2.11", "4.2.12", "4.2.13", "4.2.14", "4.2.15", "4.2.16", "4.2.17", "4.2.18", "4.2.19", "4.2.20", "4.2.21", "4.2.22", "4.2.23", "4.2.24", "4.2.25", "5.0a1", "5.0b1", "5.0rc1", "5.0", "5.0.1", "5.0.2", "5.0.3", "5.0.4", "5.0.5", "5.0.6", "5.1a1", "5.1b1", "5.0.7", "5.1rc1", "5.0.8", "5.1", "5.1.1", "5.0.9", "5.1.2", "5.1.3", "5.0.10", "5.1.4", "5.0.11", "5.1.5", "5.0.12", "5.1.6", "5.1.7", "5.0.13", "5.1.8", "5.0.14", "5.1.9", "5.1.10", "5.1.11", "5.1.12", "5.1.13", "5.2a1", "5.2b1", "5.2rc1", "5.2", "5.2.1", "5.2.2", "5.2.3", "5.2.4", "5.2.5", "5.2.6", "5.2.7"]
Secure versions: [4.2.26, 4.2.27, 5.1.14, 5.1.15, 5.2.8, 5.2.9, 6.0, 6.0a1, 6.0b1, 6.0rc1]
Recommendation: Update to version 6.0.

418 Other Versions

Version License Security Released
4.2.19 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
4.2.18 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
4.2.17 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
4.2.16 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.15 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.14 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.13 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.12 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.11 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.2.10 BSD-3-Clause AND BSD 7 1970-01-01 - 00:00 almost 56 years
4.2.9 BSD-3-Clause AND BSD 8 1970-01-01 - 00:00 almost 56 years
4.2.8 BSD-3-Clause AND BSD 8 1970-01-01 - 00:00 almost 56 years
4.2.7 BSD-3-Clause AND BSD 8 1970-01-01 - 00:00 almost 56 years
4.2.6 BSD-3-Clause AND BSD 9 1970-01-01 - 00:00 almost 56 years
4.2.5 BSD-3-Clause AND BSD 10 1970-01-01 - 00:00 almost 56 years
4.2.4 BSD-3-Clause AND BSD 11 1970-01-01 - 00:00 almost 56 years
4.2.3 BSD-3-Clause AND BSD 11 1970-01-01 - 00:00 almost 56 years
4.2.2 BSD-3-Clause AND BSD 12 1970-01-01 - 00:00 almost 56 years
4.2.1 BSD-3-Clause AND BSD 12 1970-01-01 - 00:00 almost 56 years
4.2 BSD-3-Clause AND BSD 12 1970-01-01 - 00:00 almost 56 years
4.1.13 BSD-3-Clause AND BSD 2 1970-01-01 - 00:00 almost 56 years
4.1.12 BSD-3-Clause AND BSD 3 1970-01-01 - 00:00 almost 56 years
4.1.11 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
4.1.10 BSD-3-Clause AND BSD 5 1970-01-01 - 00:00 almost 56 years
4.1.9 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.1.8 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.1.7 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.1.6 BSD-3-Clause AND BSD 6 1970-01-01 - 00:00 almost 56 years
4.1.5 BSD-3-Clause AND BSD 7 1970-01-01 - 00:00 almost 56 years
4.1.4 BSD-3-Clause AND BSD 7 1970-01-01 - 00:00 almost 56 years
4.1.3 BSD-3-Clause AND BSD 7 1970-01-01 - 00:00 almost 56 years
4.1.2 BSD-3-Clause AND BSD 7 1970-01-01 - 00:00 almost 56 years
4.1.1 BSD-3-Clause AND BSD 8 1970-01-01 - 00:00 almost 56 years
4.1 BSD-3-Clause AND BSD 8 1970-01-01 - 00:00 almost 56 years
4.0.10 BSD-3-Clause AND BSD 3 1970-01-01 - 00:00 almost 56 years
4.0.9 BSD-3-Clause AND BSD 3 1970-01-01 - 00:00 almost 56 years
4.0.8 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
4.0.7 BSD-3-Clause AND BSD 5 1970-01-01 - 00:00 almost 56 years
4.0.6 BSD-3-Clause AND BSD 5 2022-07-04 - 07:57 over 3 years
4.0.5 BSD-3-Clause AND BSD 6 2022-06-01 - 12:22 over 3 years
4.0.4 BSD-3-Clause AND BSD 6 2022-04-11 - 07:53 over 3 years
4.0.3 BSD-3-Clause AND BSD 6 2022-03-01 - 08:47 almost 4 years
4.0.2 BSD-3-Clause AND BSD 6 2022-02-01 - 07:56 almost 4 years
4.0.1 BSD-3-Clause AND BSD 8 2022-01-04 - 09:53 almost 4 years
4.0 BSD-3-Clause AND BSD 8 2021-12-07 - 09:19 about 4 years
3.2.25 BSD-3-Clause AND BSD 2 1970-01-01 - 00:00 almost 56 years
3.2.24 BSD-3-Clause AND BSD 3 1970-01-01 - 00:00 almost 56 years
3.2.23 BSD-3-Clause AND BSD 3 1970-01-01 - 00:00 almost 56 years
3.2.22 BSD-3-Clause AND BSD 4 1970-01-01 - 00:00 almost 56 years
3.2.21 BSD-3-Clause AND BSD 5 1970-01-01 - 00:00 almost 56 years