5.1.4
14 years ago
17 days ago
Known vulnerabilities in the django package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to SQL Injection via the Note:
Applications that use the How to fix SQL Injection? Upgrade | [,4.2.17)[5.0,5.0.10)[5.1a1,5.1.4) |
Affected versions of this package are vulnerable to Command Injection via certain inputs containing large sequences of nested incomplete HTML entities submitted to the How to fix Command Injection? Upgrade | [,4.2.17)[5.0,5.0.10)[5.1a1,5.1.4) |
Affected versions of this package are vulnerable to Denial of Service (DoS) due to not accounting for very large inputs involving intermediate How to fix Denial of Service (DoS)? Upgrade | [,4.2.16)[5.0a1,5.0.9)[5.1a1,5.1.1) |
Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions due to unhandled email sending failures in the How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade | [,4.2.16)[5.0a1,5.0.9)[5.1a1,5.1.1) |
Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? Upgrade | [,4.2.15)[5.0,5.0.8) |
Affected versions of this package are vulnerable to Uncontrolled Resource Consumption via the How to fix Uncontrolled Resource Consumption? Upgrade | [,4.2.15)[5.0,5.0.8) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via certain inputs with a very large number of Unicode characters in the How to fix Denial of Service (DoS)? Upgrade | [,4.2.15)[5.0,5.0.8) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via very large inputs with a specific sequence of characters in the How to fix Denial of Service (DoS)? Upgrade | [,4.2.15)[5.0,5.0.8) |
Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade | [,4.2.14)[5.0a1,5.0.7) |
Affected versions of this package are vulnerable to Directory Traversal via the derived classes of the Note: Built-in Storage sub-classes were not affected by this vulnerability. How to fix Directory Traversal? Upgrade | [,4.2.14)[5.0a1,5.0.7) |
Affected versions of this package are vulnerable to Denial of Service (DoS) in How to fix Denial of Service (DoS)? Upgrade | [,4.2.14)[5.0a1,5.0.7) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via the in How to fix Denial of Service (DoS)? Upgrade | [,4.2.14)[5.0a1,5.0.7) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in Note: The function is only vulnerable when How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,3.2.25)[4.0a1,4.2.11)[5.0a1,5.0.3) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via the Note: This vulnerability is only exploitable on Windows systems. How to fix Denial of Service (DoS)? Upgrade | [,3.2.23)[4.0a1,4.1.13)[4.2a1,4.2.7) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,3.2.22)[4.0,4.1.12)[4.2,4.2.6) |
Affected versions of this package are vulnerable to Denial of Service (DoS) in the How to fix Denial of Service (DoS)? Upgrade | [,3.2.21)[4.0a1,4.1.11)[4.2a1,4.2.5) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,3.2.20)[4.0a1,4.1.10)[4.2a1,4.2.3) |
Affected versions of this package are vulnerable to Arbitrary File Upload by bypassing of validation of all but the last file when uploading multiple files using a single How to fix Arbitrary File Upload? Upgrade | [,3.2.19)[4.1a1,4.1.9)[4.2a1,4.2.1) |
Affected versions of this package are vulnerable to Denial of Service (DoS) when parsing multipart form data in How to fix Denial of Service (DoS)? Upgrade | [,3.2.18)[4.0a1,4.0.10)[4.1a1,4.1.7) |
Affected versions of this package are vulnerable to Reflected File Download (RFD) as it is possible to set the How to fix Reflected File Download (RFD)? Upgrade | [,3.2.15)[4.0a1,4.0.7)[4.1rc1,4.1) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to SQL Injection via the Note: Applications that constrain the lookup name and kind choice to a known safe list are unaffected. Django 4.1 pre-released versions (4.1a1, 4.1a2) are affected by this issue, please avoid using the 4.1 branch until 4.1.0 is released. How to fix SQL Injection? Upgrade | [,3.2.14)[4.0a1,4.0.6) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to SQL Injection via How to fix SQL Injection? Upgrade | [,2.2.28)[3.0,3.2.13)[4.0,4.0.4) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to SQL Injection in How to fix SQL Injection? Upgrade | [,2.2.28)[3.0,3.2.13)[4.0,4.0.4) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade | [,2.2.27)[3.0,3.2.12)[4.0,4.0.2) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via an infinite loop during file parsing that occurs when certain inputs are passed to multipart forms. How to fix Denial of Service (DoS)? Upgrade | [,2.2.27)[3.0,3.2.12)[4.0,4.0.2) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Directory Traversal via Note: this is exploitable only if crafted file names are being directly passed to the How to fix Directory Traversal? Upgrade | [,2.2.26)[3.0,3.2.11)[4.0,4.0.1) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Information Exposure via the Note: all untrusted user input should be validated before use. How to fix Information Exposure? Upgrade | [,2.2.26)[3.0,3.2.11)[4.0,4.0.1) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Denial of Service (DoS) via Note: it is exploitable under the assumption that access to user registration is unrestricted. How to fix Denial of Service (DoS)? Upgrade | [,2.2.26)[3.0,3.2.11)[4.0,4.0.1) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Access Restriction Bypass. HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. How to fix Access Restriction Bypass? Upgrade | [,2.2.25)[3.0,3.1.14)[3.2,3.2.10) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Directory Traversal via How to fix Directory Traversal? Upgrade | [3.2,3.2.4)[3.1,3.1.12)[,2.2.24) |
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Affected versions of this package are vulnerable to Improper Input Validation. How to fix Improper Input Validation? Upgrade | [2.2,2.2.24)[3.1,3.1.12)[3.2,3.2.4) |