python-django vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-django package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
CVE-2024-53907

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
CVE-2024-24680

*
  • M
CVE-2024-24680

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • L
CVE-2024-45231

*
  • L
CVE-2024-45231

*
  • L
CVE-2024-45231

*
  • L
CVE-2024-45231

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Validation of Specified Type of Input

*
  • M
SQL Injection

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Directory Traversal

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Incorrect Regular Expression

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*