Django — свободный фреймворк для веб-приложений на языке Python, использующий шаблон проектирования MVC
Релизный цикл, информация об уязвимостях
График релизов
Количество 673
GHSA-fxpg-gg9g-76gj
Cross-site scripting in django
GHSA-x88j-93vc-wpmp
Session manipulation in Django
GHSA-7g9h-c88w-r7h2
Directory traversal in Django
GHSA-7wph-fc4w-wqp2
Improper date handling in Django
GHSA-fwr5-q9rx-294f
Improper query string handling in Django
GHSA-3jqw-crqj-w8qw
Denial of service in django
GHSA-h95j-h2rv-qrg4
Django Cross-Site Request Forgery vulnerability
GHSA-5j2h-h5hg-3wf8
Cross-site request forgery in Django

CVE-2018-7537
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
CVE-2018-7537
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
GHSA-fxpg-gg9g-76gj Cross-site scripting in django | CVSS3: 6.1 | 0% Низкий | почти 7 лет назад | |
GHSA-x88j-93vc-wpmp Session manipulation in Django | CVSS3: 4 | 1% Низкий | почти 7 лет назад | |
GHSA-7g9h-c88w-r7h2 Directory traversal in Django | CVSS3: 9.1 | 1% Низкий | почти 7 лет назад | |
GHSA-7wph-fc4w-wqp2 Improper date handling in Django | CVSS3: 7.5 | 5% Низкий | почти 7 лет назад | |
GHSA-fwr5-q9rx-294f Improper query string handling in Django | CVSS3: 6.5 | 1% Низкий | почти 7 лет назад | |
GHSA-3jqw-crqj-w8qw Denial of service in django | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад | |
GHSA-h95j-h2rv-qrg4 Django Cross-Site Request Forgery vulnerability | CVSS3: 7.5 | 0% Низкий | почти 7 лет назад | |
GHSA-5j2h-h5hg-3wf8 Cross-site request forgery in Django | CVSS3: 7.5 | 3% Низкий | почти 7 лет назад | |
![]() | CVE-2018-7537 An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. | CVSS3: 5.3 | 1% Низкий | больше 7 лет назад |
CVE-2018-7537 An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ... | CVSS3: 5.3 | 1% Низкий | больше 7 лет назад |
Уязвимостей на страницу