Package | Installed | Affected | Info |
---|---|---|---|
Django | 5.1.3 | >=5.2,<5.2.2 , >=5.0a1,<5.1.10 , <4.2.22 |
show An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems. |
Django | 5.1.3 | >=5.0,<5.0.14 , >=5.1,<5.1.8 |
show An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.views.LoginView, django.contrib.auth.views.LogoutView, and django.views.i18n.set_language are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. |
Django | 5.1.3 | >=5.2.0,<5.2.1 , >=5.1.0,<5.1.9 , <4.2.21 |
show An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). |
Django | 5.1.3 | <4.2.17 , >=5.0a1,<5.0.10 , >=5.1a1,<5.1.4 |
show Django affected versions are vulnerable to a potential SQL injection in the HasKey(lhs, rhs) lookup on Oracle databases. The vulnerability arises when untrusted data is directly used as the lhs value in the django.db.models.fields.json.HasKey lookup. However, applications using the jsonfield.has_key lookup with the __ syntax remain unaffected by this issue. |
Django | 5.1.3 | <4.2.17 , >=5.0a1,<5.0.10 , >=5.1a1,<5.1.4 |
show Affected versions of Django are vulnerable to a potential denial-of-service (DoS) attack in the `django.utils.html.strip_tags()` method. The vulnerability occurs when the `strip_tags()` method or the `striptags` template filter processes inputs containing large sequences of nested, incomplete HTML entities. |
Django | 5.1.3 | <4.2.18 , >=5.0.0,<5.0.11 , >=5.1.0,<5.1.5 |
show Affected versions of Django are vulnerable to a potential denial-of-service attack due to improper IPv6 validation. The lack of upper limit enforcement for input strings in clean_ipv6_address, is_valid_ipv6_address, and the django.forms.GenericIPAddressField form field allowed attackers to exploit overly long inputs, causing resource exhaustion. The vulnerability is addressed by defining a max_length of 39 characters for affected form fields. The django.db.models.GenericIPAddressField model field was not impacted. Users should upgrade promptly. |
https://pyup.io/repos/github/imAsparky/django-cookiecutter/python-3-shield.svg
[](https://pyup.io/repos/github/imAsparky/django-cookiecutter/)
.. image:: https://pyup.io/repos/github/imAsparky/django-cookiecutter/python-3-shield.svg :target: https://pyup.io/repos/github/imAsparky/django-cookiecutter/ :alt: Python 3
<a href="https://pyup.io/repos/github/imAsparky/django-cookiecutter/"><img src="https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/imAsparky/django-cookiecutter/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/imAsparky/django-cookiecutter/
{<img src="https://pyup.io/repos/github/imAsparky/django-cookiecutter/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/imAsparky/django-cookiecutter/]
https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg
[](https://pyup.io/repos/github/imAsparky/django-cookiecutter/)
.. image:: https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg :target: https://pyup.io/repos/github/imAsparky/django-cookiecutter/ :alt: Updates
<a href="https://pyup.io/repos/github/imAsparky/django-cookiecutter/"><img src="https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg(Updates)!:https://pyup.io/repos/github/imAsparky/django-cookiecutter/
{<img src="https://pyup.io/repos/github/imAsparky/django-cookiecutter/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/imAsparky/django-cookiecutter/]