python-django-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-django-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

<0:1.8.14-1.el7ost
  • M
Covert Timing Channel

<0:1.8.11-1.el7ost
  • M
Open Redirect

<0:1.8.11-1.el7ost
  • M
Allocation of Resources Without Limits or Throttling

<0:1.8.4-1.el7
  • M
Information Exposure

<0:1.8.7-1.el7
  • M
Cross-site Request Forgery (CSRF)

<0:1.8.15-1.el7ost
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

<0:1.8.18-1.el7ost
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
SQL Injection

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Incorrect Default Permissions

*
  • H
SQL Injection

*
  • M
Improper Authorization

*
  • M
Incorrect Default Permissions

*
  • M
Improper Input Validation

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
HTTP Request Smuggling

*