python-django vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-django package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

*
  • H
SQL Injection

*
  • M
Resource Exhaustion

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
CVE-2024-24680

*
  • L
CVE-2024-45231

*
  • L
CVE-2024-45231

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
SQL Injection

*
  • L
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Directory Traversal

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Cross-site Scripting (XSS)

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Authorization

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Incorrect Regular Expression

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*