open-envs / data /cve_cache /PyPI__django.json
user.email
Align submission flow and deployment
a17ec91
[
{
"cve_id": "CVE-2024-45230",
"osv_id": "GHSA-5hgc-2vfp-mqvc",
"summary": "Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.1.1",
"published": "2024-10-08T18:33:13Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-57833",
"osv_id": "GHSA-6w2r-r2m5-xq5w",
"summary": "Django is subject to SQL injection through its column aliases",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "4.2.24",
"published": "2025-09-08T18:31:31Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-41990",
"osv_id": "GHSA-795c-9xpc-xw6g",
"summary": "Django vulnerable to a denial-of-service attack",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.0.8",
"published": "2024-08-07T15:30:42Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-48432",
"osv_id": "GHSA-7xr5-9hcq-chf9",
"summary": "Django Improper Output Neutralization for Logs vulnerability",
"cvss_score": 8.5,
"severity": "HIGH",
"fixed_version": "5.2.2",
"published": "2025-06-05T03:30:58Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-53907",
"osv_id": "GHSA-8498-2h75-472j",
"summary": "Django denial-of-service in django.utils.html.strip_tags()",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.1.4",
"published": "2024-12-06T12:30:47Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-39330",
"osv_id": "GHSA-9jmf-237g-qf46",
"summary": "Django Path Traversal vulnerability",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.0.7",
"published": "2024-07-10T06:33:52Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-39614",
"osv_id": "GHSA-f6f8-9mx6-9mx2",
"summary": "Django vulnerable to Denial of Service",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.0.7",
"published": "2024-07-10T06:33:52Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-64459",
"osv_id": "GHSA-frmv-pr5f-9mcr",
"summary": "Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.2.8",
"published": "2025-11-05T15:31:07Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-41989",
"osv_id": "GHSA-jh75-99hh-qvx9",
"summary": "Django memory consumption vulnerability",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.0.8",
"published": "2024-08-07T15:30:42Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-53908",
"osv_id": "GHSA-m9g8-fxxm-xg86",
"summary": "Django SQL injection in HasKey(lhs, rhs) on Oracle",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.0.10",
"published": "2024-12-06T12:30:47Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-26699",
"osv_id": "GHSA-p3fp-8748-vqfq",
"summary": "Django vulnerable to Allocation of Resources Without Limits or Throttling",
"cvss_score": 7.5,
"severity": "HIGH",
"fixed_version": "4.2.20",
"published": "2025-03-06T21:31:26Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-42005",
"osv_id": "GHSA-pv4p-cwwg-4rph",
"summary": "Django SQL injection vulnerability",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.0.8",
"published": "2024-08-07T15:30:42Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-56374",
"osv_id": "GHSA-qcgg-j2x8-h9g8",
"summary": "Django has a potential denial-of-service vulnerability in IPv6 validation",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.1.5",
"published": "2025-01-14T21:31:47Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-38875",
"osv_id": "GHSA-qg2p-9jwr-mmqf",
"summary": "Django vulnerable to Denial of Service",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "4.2.14",
"published": "2024-07-10T06:33:52Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-64458",
"osv_id": "GHSA-qw25-v68c-qjf3",
"summary": "Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows",
"cvss_score": 9.5,
"severity": "CRITICAL",
"fixed_version": "5.2.8",
"published": "2025-11-05T15:31:07Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-41991",
"osv_id": "GHSA-r836-hh6v-rg5g",
"summary": "Django vulnerable to denial-of-service attack",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.0.8",
"published": "2024-08-07T15:30:42Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-45231",
"osv_id": "GHSA-rrqc-c2jx-6jgv",
"summary": "Django allows enumeration of user e-mail addresses",
"cvss_score": 8.5,
"severity": "HIGH",
"fixed_version": "5.1.1",
"published": "2024-10-08T18:33:13Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-27351",
"osv_id": "GHSA-vm8q-m57g-pff3",
"summary": "Regular expression denial-of-service in Django",
"cvss_score": 8.5,
"severity": "HIGH",
"fixed_version": "3.2.25",
"published": "2024-03-15T21:30:43Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2025-27556",
"osv_id": "GHSA-wqfg-m96j-85vm",
"summary": "Django Potential Denial of Service (DoS) on Windows ",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.0.14",
"published": "2025-04-02T15:31:37Z",
"ecosystem": "PyPI",
"package": "django"
},
{
"cve_id": "CVE-2024-39329",
"osv_id": "GHSA-x7q2-wr7g-xqmf",
"summary": "Django vulnerable to user enumeration attack",
"cvss_score": 8.0,
"severity": "HIGH",
"fixed_version": "5.0.7",
"published": "2024-07-10T06:33:52Z",
"ecosystem": "PyPI",
"package": "django"
}
]