Package | Installed | Affected | Info |
---|---|---|---|
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
django | 5.2 | >=5.2,<5.2.2 , >=5.0a1,<5.1.10 , <4.2.22 |
show An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems. |
django | 5.2 | <4.2.21 , >=5.2a1,<5.2.1 , >=5.1.0a1,<5.1.9 |
show An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). |
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
django | 5.2 | >=5.2,<5.2.2 , >=5.0a1,<5.1.10 , <4.2.22 |
show An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems. |
django | 5.2 | <4.2.21 , >=5.2a1,<5.2.1 , >=5.1.0a1,<5.1.9 |
show An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). |
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
Package | Installed | Affected | Info |
---|---|---|---|
django | 5.2 | >=5.2,<5.2.2 , >=5.0a1,<5.1.10 , <4.2.22 |
show An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems. |
django | 5.2 | <4.2.21 , >=5.2a1,<5.2.1 , >=5.1.0a1,<5.1.9 |
show An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). |
pillow | 11.2.1 | >=11.2.1,<11.3.0 |
show Affected versions of this package are vulnerable to a Buffer Overflow when saving sufficiently large compressed DDS images (>64KB with default settings). The DDS encoding functionality fails to perform bounds checking when writing to the destination buffer, leading to a heap buffer overflow condition. This vulnerability was introduced in Pillow 11.2.0 when BCn compression support for DDS format was added. |
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg :target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/ :alt: Python 3
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg :target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/ :alt: Updates
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg(Updates)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]