Django@5.0a1 vulnerabilities
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
-
latest version
5.1.3
-
latest non vulnerable version
-
first published
15 years ago
-
latest version published
13 days ago
-
licenses detected
- [3.1a1,)
Direct Vulnerabilities
Known vulnerabilities in the Django package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Denial of Service (DoS) due to not accounting for very large inputs involving intermediate How to fix Denial of Service (DoS)? Upgrade |
[,4.2.16)
[5.0a1,5.0.9)
[5.1a1,5.1.1)
|
Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions due to unhandled email sending failures in the How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade |
[,4.2.16)
[5.0a1,5.0.9)
[5.1a1,5.1.1)
|
Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Directory Traversal via the derived classes of the Note: Built-in Storage sub-classes were not affected by this vulnerability. How to fix Directory Traversal? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) in How to fix Denial of Service (DoS)? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via the in How to fix Denial of Service (DoS)? Upgrade |
[,4.2.14)
[5.0a1,5.0.7)
|
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in Note: The function is only vulnerable when How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,3.2.25)
[4.0a1,4.2.11)
[5.0a1,5.0.3)
|