Package | Installed | Affected | Info |
---|---|---|---|
Django | 5.0.7 | <4.2.16 , >=5.0a1,<5.0.9 , >=5.1a1,<5.1.1 |
show A potential denial-of-service vulnerability has been identified in Django's urlize() and urlizetrunc() functions in django.utils.html. This vulnerability can be triggered by inputting huge strings containing a specific sequence of characters. |
Django | 5.0.7 | <4.2.15 , >=5.0a1,<5.0.8 |
show Django addresses a memory exhaustion issue in django.utils.numberformat.floatformat(). When floatformat receives a string representation of a number in scientific notation with a large exponent, it could lead to excessive memory consumption. To prevent this, decimals with more than 200 digits are now returned as-is. |
Django | 5.0.7 | <4.2.16 , >=5.0a1,<5.0.9 , >=5.1a1,<5.1.1 |
show A security vulnerability has been discovered in certain versions of Django, affecting the password reset functionality. The PasswordResetForm class in django.contrib.auth.forms inadvertently allowed attackers to enumerate user email addresses by exploiting unhandled exceptions during the email sending process. This could be done by issuing password reset requests and observing the responses. Django has implemented a fix where these exceptions are now caught and logged using the django.contrib.auth logger, preventing potential information leakage through error responses. |
Django | 5.0.7 | <4.2.15 , >=5.0a1,<5.0.8 |
show Affected versions of Django has a potential SQL injection vulnerability in the QuerySet.values() and QuerySet.values_list() methods. When used on models with a JSONField, these methods are susceptible to SQL injection through column aliases if a crafted JSON object key is passed as an argument. |
Django | 5.0.7 | <4.2.15 , >=5.0a1,<5.0.8 |
show Django has a potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget. The urlize and urlizetrunc functions, along with AdminURLFieldWidget, are vulnerable to denial-of-service attacks when handling inputs with a very large number of Unicode characters. |
https://pyup.io/repos/github/kiwitcms/Kiwi/python-3-shield.svg
[![Python 3](https://pyup.io/repos/github/kiwitcms/Kiwi/python-3-shield.svg)](https://pyup.io/repos/github/kiwitcms/Kiwi/)
.. image:: https://pyup.io/repos/github/kiwitcms/Kiwi/python-3-shield.svg :target: https://pyup.io/repos/github/kiwitcms/Kiwi/ :alt: Python 3
<a href="https://pyup.io/repos/github/kiwitcms/Kiwi/"><img src="https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/kiwitcms/Kiwi/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/kiwitcms/Kiwi/
{<img src="https://pyup.io/repos/github/kiwitcms/Kiwi/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/kiwitcms/Kiwi/]
https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg
[![Updates](https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg)](https://pyup.io/repos/github/kiwitcms/Kiwi/)
.. image:: https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg :target: https://pyup.io/repos/github/kiwitcms/Kiwi/ :alt: Updates
<a href="https://pyup.io/repos/github/kiwitcms/Kiwi/"><img src="https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg(Updates)!:https://pyup.io/repos/github/kiwitcms/Kiwi/
{<img src="https://pyup.io/repos/github/kiwitcms/Kiwi/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/kiwitcms/Kiwi/]