python-django20-bash-completion vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-django20-bash-completion package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • L
CVE-2024-45231

*
  • M
Resource Exhaustion

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Validation of Specified Type of Input

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Directory Traversal

*
  • M
Improper Validation of Specified Type of Input

*
  • L
Directory Traversal

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
CVE-2024-24680

*
  • M
CVE-2024-24680

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.0.13-12.el8ost
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.13-18.el8ost
  • H
Cross-site Scripting (XSS)

<0:2.0.13-18.el8ost
  • M
Directory Traversal

<0:2.0.13-16.el8ost.1
  • M
Directory Traversal

<0:2.0.13-16.el8ost.1
  • M
Server-Side Request Forgery (SSRF)

<0:2.0.13-16.el8ost.1
  • M
Directory Traversal

<0:2.0.13-16.el8ost.1
  • M
Directory Traversal

<0:2.0.13-16.el8ost.1
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
SQL Injection

<0:2.0.13-18.el8ost
  • L
HTTP Request Smuggling

*