Django@4.1.12 vulnerabilities
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
-
latest version
5.1.3
-
latest non vulnerable version
-
first published
15 years ago
-
latest version published
13 days ago
-
licenses detected
- [3.1a1,)
Direct Vulnerabilities
Known vulnerabilities in the Django package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Denial of Service (DoS) due to not accounting for very large inputs involving intermediate How to fix Denial of Service (DoS)? Upgrade |
[,4.2.16)
[5.0a1,5.0.9)
[5.1a1,5.1.1)
|
Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions due to unhandled email sending failures in the How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade |
[,4.2.16)
[5.0a1,5.0.9)
[5.1a1,5.1.1)
|
Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? Upgrade |
[,4.2.15)
[5.0,5.0.8)
|
Affected versions of this package are vulnerable to Uncontrolled Resource Consumption via the How to fix Uncontrolled Resource Consumption? Upgrade |
[,4.2.15)
[5.0,5.0.8)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via certain inputs with a very large number of Unicode characters in the How to fix Denial of Service (DoS)? Upgrade |
[,4.2.15)
[5.0,5.0.8)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via very large inputs with a specific sequence of characters in the How to fix Denial of Service (DoS)? Upgrade |
[,4.2.15)
[5.0,5.0.8)
|
Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Directory Traversal via the derived classes of the Note: Built-in Storage sub-classes were not affected by this vulnerability. How to fix Directory Traversal? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) in How to fix Denial of Service (DoS)? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via the in How to fix Denial of Service (DoS)? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in Note: The function is only vulnerable when How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,3.2.25)
[4.0a1,4.2.11)
[5.0a1,5.0.3)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via the Note: This vulnerability is only exploitable on Windows systems. How to fix Denial of Service (DoS)? Upgrade |
[,3.2.23)
[4.0a1,4.1.13)
[4.2a1,4.2.7)
|