python-django vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-django package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-27351

*
  • L
CVE-2024-24680

*
  • L
Improper Validation of Specified Quantity in Input

*
  • H
Improper Validation of Specified Quantity in Input

<1:1.11.29-1+deb10u10
  • H
Inefficient Regular Expression Complexity

<1:1.11.29-1+deb10u9
  • C
Improper Input Validation

<1:1.11.29-1+deb10u8
  • H
Resource Exhaustion

<1:1.11.29-1+deb10u7
  • H
Allocation of Resources Without Limits or Throttling

<1:1.11.29-1+deb10u6
  • C
SQL Injection

<1:1.11.29-1+deb10u2
  • C
SQL Injection

<1:1.11.29-1+deb10u3
  • M
Cross-site Scripting (XSS)

<1:1.11.29-1+deb10u4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:1.11.29-1+deb10u4
  • H
CVE-2021-45115

<1:1.11.29-1+deb10u3
  • M
Directory Traversal

<1:1.11.29-1+deb10u4
  • H
Improper Input Validation

<1:1.11.29-1+deb10u3
  • H
Server-Side Request Forgery (SSRF)

<1:1.11.29-1+deb10u11
  • M
Directory Traversal

<1:1.11.29-1+deb10u11
  • L
Cross-site Scripting (XSS)

*
  • H
Unrestricted Upload of File with Dangerous Type

<1:1.11.29-1+deb10u11
  • M
Directory Traversal

<1:1.11.29-1+deb10u11
  • M
HTTP Request Smuggling

<1:1.11.29-1+deb10u2
  • M
Directory Traversal

<1:1.11.29-1+deb10u2
  • H
Incorrect Default Permissions

<1:1.11.29-1+deb10u2
  • H
Incorrect Default Permissions

<1:1.11.29-1+deb10u2
  • M
Cross-site Scripting (XSS)

<1:1.11.29-1~deb10u1
  • M
Improper Certificate Validation

<1:1.11.29-1~deb10u1
  • H
SQL Injection

<1:1.11.29-1~deb10u1
  • C
SQL Injection

<1:1.11.28-1~deb10u1
  • C
Weak Password Recovery Mechanism for Forgotten Password

<1:1.11.27-1~deb10u1
  • H
Resource Exhaustion

<1:1.11.23-1~deb10u1
  • C
SQL Injection

<1:1.11.23-1~deb10u1
  • H
Resource Exhaustion

<1:1.11.23-1~deb10u1
  • H
Uncontrolled Recursion

<1:1.11.23-1~deb10u1
  • M
Cleartext Transmission of Sensitive Information

<1:1.11.22-1~deb10u1
  • M
Cross-site Scripting (XSS)

<1:1.11.21-1
  • L
Allocation of Resources Without Limits or Throttling

<1:1.11.20-1
  • M
Improper Input Validation

<1:1.11.18-1
  • M
Open Redirect

<1:1.11.15-1
  • M
Incorrect Regular Expression

<1:1.11.11-1
  • M
Incorrect Regular Expression

<1:1.11.11-1
  • H
Information Exposure

<1:1.11.10-1
  • L
Cross-site Scripting (XSS)

<1:1.11.5-1
  • M
Open Redirect

<1:1.10.7-1
  • M
Open Redirect

<1:1.10.7-1
  • C
Use of Hard-coded Credentials

<1:1.10.3-1
  • H
Access Restriction Bypass

<1:1.10.3-1
  • L
Security Features

<1:1.10-1
  • M
Cross-site Scripting (XSS)

<1:1.9.8-1
  • H
Cross-site Scripting (XSS)

<1.9.4-1
  • L
Information Exposure

<1.9.4-1
  • M
Improper Access Control

<1.9.2-1
  • M
Information Exposure

<1.8.7-1
  • M
Resource Management Errors

<1.7.10-1
  • M
Resource Management Errors

<1.7.10-1
  • M
Improper Input Validation

<1.7.9-1
  • H
Resource Management Errors

<1.7.9-1
  • M
Cross-site Scripting (XSS)

<1.7.7-1
  • M
Resource Management Errors

<1.7.7-1
  • M
Cross-site Scripting (XSS)

<1.7.6-1
  • M
Code

<1.7.1-1.1
  • M
Resource Management Errors

<1.7.1-1.1
  • M
Code

<1.7.1-1.1
  • M
Cross-site Scripting (XSS)

<1.7.1-1.1
  • M
Improper Input Validation

<1.6.6-1
  • L
Access Restriction Bypass

<1.6.6-1
  • M
Improper Authentication

<1.6.6-1
  • M
Resource Management Errors

<1.6.6-1
  • M
CVE-2014-1418

<1.6.5-1
  • M
Improper Input Validation

<1.6.5-1
  • C
Resource Management Errors

<1.6.3-1
  • M
Arbitrary Code Injection

<1.6.3-1
  • M
Access Restriction Bypass

<1.6.3-1
  • M
Cross-site Scripting (XSS)

<1.5.2-1
  • M
Cross-site Scripting (XSS)

<1.5.2-1
  • M
Improper Authentication

<1.5.4-1
  • M
Directory Traversal

<1.5.3-1
  • M
Numeric Errors

<1.4.4-1
  • M
Information Exposure

<1.4.4-1
  • M
Information Exposure

<1.4.4-1
  • M
Improper Input Validation

<1.4.2-1
  • M
Cross-site Scripting (XSS)

<1.4.1-1
  • M
Improper Input Validation

<1.4.1-1
  • M
Out-of-Bounds

<1.4.1-1
  • M
Resource Management Errors

<1.3.1-1
  • M
Improper Input Validation

<1.3.1-1
  • M
Improper Input Validation

<1.3.1-1
  • M
Improper Input Validation

<1.3.1-1
  • M
Cross-site Request Forgery (CSRF)

<1.3.1-1
  • M
Cross-site Scripting (XSS)

<1.2.5-1
  • M
Cross-site Request Forgery (CSRF)

<1.2.5-1
  • M
Access Restriction Bypass

<1.2.4-1
  • M
Improper Input Validation

<1.2.4-1
  • L
Cross-site Scripting (XSS)

<1.2.3-1
  • M
CVE-2009-3695

<1.1.1-1
  • L
Directory Traversal

<1.1-1
  • M
Cross-site Request Forgery (CSRF)

<1.0-1
  • L
Cross-site Scripting (XSS)

<0.96.2-1
  • L
Cross-site Request Forgery (CSRF)

<1.2.1
  • L
Resource Management Errors

<0.96-1.1
  • H
CVE-2007-0404

<0.95.1-1
  • M
CVE-2007-0405

<0.95.1-1