Django — свободный фреймворк для веб-приложений на языке Python, использующий шаблон проектирования MVC
Релизный цикл, информация об уязвимостях
График релизов
Количество 679

CVE-2024-22199
This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks.
GHSA-4mq2-gc4j-cmw6
Django Template Engine Vulnerable to XSS

openSUSE-SU-2023:0390-1
Security update for python-Django1

openSUSE-SU-2023:0389-1
Security update for python-Django1
GHSA-h8gc-pgj2-vjm3
Django Denial-of-service in django.utils.text.Truncator
GHSA-7h4p-27mh-hmrw
Django Denial of service vulnerability in django.utils.encoding.uri_to_iri

CVE-2023-43665
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
CVE-2023-43665
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, ...

CVE-2023-41164
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
CVE-2023-41164
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | CVE-2024-22199 This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks. | CVSS3: 9.3 | 2% Низкий | больше 1 года назад |
GHSA-4mq2-gc4j-cmw6 Django Template Engine Vulnerable to XSS | CVSS3: 9.3 | 2% Низкий | больше 1 года назад | |
![]() | openSUSE-SU-2023:0390-1 Security update for python-Django1 | 1% Низкий | больше 1 года назад | |
![]() | openSUSE-SU-2023:0389-1 Security update for python-Django1 | 1% Низкий | больше 1 года назад | |
GHSA-h8gc-pgj2-vjm3 Django Denial-of-service in django.utils.text.Truncator | CVSS3: 5.9 | 1% Низкий | почти 2 года назад | |
GHSA-7h4p-27mh-hmrw Django Denial of service vulnerability in django.utils.encoding.uri_to_iri | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-43665 In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232. | CVSS3: 7.5 | 1% Низкий | почти 2 года назад |
CVE-2023-43665 In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, ... | CVSS3: 7.5 | 1% Низкий | почти 2 года назад | |
![]() | CVE-2023-41164 In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters. | CVSS3: 7.5 | 0% Низкий | почти 2 года назад |
CVE-2023-41164 In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, ... | CVSS3: 7.5 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу