Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/django@0.96.0
Typepypi
Namespace
Namedjango
Version0.96.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.2.29
Latest_non_vulnerable_version6.0.4
Affected_by_vulnerabilities
0
url VCID-66kq-hbhe-9ba3
vulnerability_id VCID-66kq-hbhe-9ba3
summary The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134
1
reference_url http://code.djangoproject.com/changeset/11353
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://code.djangoproject.com/changeset/11353
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2659.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2659
reference_id
reference_type
scores
0
value 0.01377
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-21T12:55:00Z
1
value 0.01377
scoring_system epss
scoring_elements 0.80282
published_at 2026-04-16T12:55:00Z
2
value 0.01377
scoring_system epss
scoring_elements 0.80252
published_at 2026-04-13T12:55:00Z
3
value 0.01377
scoring_system epss
scoring_elements 0.80257
published_at 2026-04-12T12:55:00Z
4
value 0.01377
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-11T12:55:00Z
5
value 0.01377
scoring_system epss
scoring_elements 0.80254
published_at 2026-04-09T12:55:00Z
6
value 0.01377
scoring_system epss
scoring_elements 0.80244
published_at 2026-04-08T12:55:00Z
7
value 0.01377
scoring_system epss
scoring_elements 0.80216
published_at 2026-04-07T12:55:00Z
8
value 0.01377
scoring_system epss
scoring_elements 0.80227
published_at 2026-04-04T12:55:00Z
9
value 0.01377
scoring_system epss
scoring_elements 0.80207
published_at 2026-04-02T12:55:00Z
10
value 0.01377
scoring_system epss
scoring_elements 0.80199
published_at 2026-04-01T12:55:00Z
11
value 0.01377
scoring_system epss
scoring_elements 0.80312
published_at 2026-04-24T12:55:00Z
12
value 0.01377
scoring_system epss
scoring_elements 0.80283
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2659
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2659
5
reference_url http://secunia.com/advisories/36137
reference_id
reference_type
scores
url http://secunia.com/advisories/36137
6
reference_url http://secunia.com/advisories/36153
reference_id
reference_type
scores
url http://secunia.com/advisories/36153
7
reference_url https://github.com/django/django
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django
8
reference_url https://github.com/django/django/commit/da85d76fd6ca846f3b0ff414e042ddb5e62e2e69
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/da85d76fd6ca846f3b0ff414e042ddb5e62e2e69
9
reference_url https://github.com/django/django/commit/df7f917b7f51ba969faa49d000ffc79572c5dcb4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/df7f917b7f51ba969faa49d000ffc79572c5dcb4
10
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2009-3.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2009-3.yaml
11
reference_url https://web.archive.org/web/20111211001428/http://www.securityfocus.com/bid/35859
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20111211001428/http://www.securityfocus.com/bid/35859
12
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html
13
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html
14
reference_url http://www.djangoproject.com/weblog/2009/jul/28/security
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.djangoproject.com/weblog/2009/jul/28/security
15
reference_url http://www.djangoproject.com/weblog/2009/jul/28/security/
reference_id
reference_type
scores
url http://www.djangoproject.com/weblog/2009/jul/28/security/
16
reference_url http://www.openwall.com/lists/oss-security/2009/07/29/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/07/29/2
17
reference_url http://www.securityfocus.com/bid/35859
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/35859
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=515581
reference_id 515581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=515581
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134
reference_id 539134
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-2659
reference_id CVE-2009-2659
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2009-2659
21
reference_url https://github.com/advisories/GHSA-9xg7-gg9m-rmq9
reference_id GHSA-9xg7-gg9m-rmq9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9xg7-gg9m-rmq9
fixed_packages
0
url pkg:pypi/django@0.96.4
purl pkg:pypi/django@0.96.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@0.96.4
1
url pkg:pypi/django@1.0.3
purl pkg:pypi/django@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pvd-3217-6ygv
1
vulnerability VCID-2dhb-9yue-33h7
2
vulnerability VCID-2m9f-3cgw-ekdr
3
vulnerability VCID-325d-7dfk-sqd2
4
vulnerability VCID-42cm-j2av-87ea
5
vulnerability VCID-5g4y-1qmy-27bd
6
vulnerability VCID-66kq-hbhe-9ba3
7
vulnerability VCID-6gss-ppm5-3yc9
8
vulnerability VCID-7bu3-ckpj-gbf8
9
vulnerability VCID-84mm-45p6-xkau
10
vulnerability VCID-896g-hqec-ryb9
11
vulnerability VCID-8b12-22bg-jkch
12
vulnerability VCID-8jaq-53td-wbeg
13
vulnerability VCID-8teq-9xr9-q3fg
14
vulnerability VCID-9uzd-mmyv-mfh4
15
vulnerability VCID-a715-2qks-wyhn
16
vulnerability VCID-bgmv-mf3x-bkew
17
vulnerability VCID-br5x-v7md-47hp
18
vulnerability VCID-c1n5-4ars-u7ff
19
vulnerability VCID-czkz-mcv8-mqfc
20
vulnerability VCID-e2jd-yd4j-kqgt
21
vulnerability VCID-eker-m822-cuax
22
vulnerability VCID-g56k-prrj-aqb1
23
vulnerability VCID-hugz-zq5c-pugn
24
vulnerability VCID-jc9f-vgy8-ruan
25
vulnerability VCID-jumh-hkhx-7qc9
26
vulnerability VCID-k6s1-gnmc-e3ed
27
vulnerability VCID-mm3u-a8ar-b3hp
28
vulnerability VCID-p1dq-27t5-e7b3
29
vulnerability VCID-pv1d-wrex-hbgy
30
vulnerability VCID-qm34-ec8s-tfd7
31
vulnerability VCID-qzba-9xmg-3qer
32
vulnerability VCID-rkt5-kwum-43c8
33
vulnerability VCID-sbr6-pybe-dubq
34
vulnerability VCID-spwd-dz6f-5fh9
35
vulnerability VCID-t8ec-st1v-s3e5
36
vulnerability VCID-ttm3-5a6e-wfa1
37
vulnerability VCID-ukxp-wqpr-t3by
38
vulnerability VCID-ura5-t7s9-8fck
39
vulnerability VCID-v466-zd6u-dqce
40
vulnerability VCID-w2dv-u8h6-sbgs
41
vulnerability VCID-w4pr-k5nj-ckgy
42
vulnerability VCID-x4ev-6zjm-sbe4
43
vulnerability VCID-x516-xwze-6ba3
44
vulnerability VCID-xtqq-9751-r3dq
45
vulnerability VCID-yemh-qd63-wuca
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@1.0.3
2
url pkg:pypi/django@1.1
purl pkg:pypi/django@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pvd-3217-6ygv
1
vulnerability VCID-2dhb-9yue-33h7
2
vulnerability VCID-2m9f-3cgw-ekdr
3
vulnerability VCID-325d-7dfk-sqd2
4
vulnerability VCID-42cm-j2av-87ea
5
vulnerability VCID-47er-pm3z-qfh3
6
vulnerability VCID-5g4y-1qmy-27bd
7
vulnerability VCID-6gss-ppm5-3yc9
8
vulnerability VCID-7bu3-ckpj-gbf8
9
vulnerability VCID-84mm-45p6-xkau
10
vulnerability VCID-896g-hqec-ryb9
11
vulnerability VCID-8jaq-53td-wbeg
12
vulnerability VCID-8teq-9xr9-q3fg
13
vulnerability VCID-9uzd-mmyv-mfh4
14
vulnerability VCID-a6d1-p4q6-fyav
15
vulnerability VCID-a715-2qks-wyhn
16
vulnerability VCID-bgmv-mf3x-bkew
17
vulnerability VCID-br5x-v7md-47hp
18
vulnerability VCID-c1n5-4ars-u7ff
19
vulnerability VCID-czkz-mcv8-mqfc
20
vulnerability VCID-e2jd-yd4j-kqgt
21
vulnerability VCID-eker-m822-cuax
22
vulnerability VCID-fw2d-s2rt-syfz
23
vulnerability VCID-g56k-prrj-aqb1
24
vulnerability VCID-hugz-zq5c-pugn
25
vulnerability VCID-jc9f-vgy8-ruan
26
vulnerability VCID-jumh-hkhx-7qc9
27
vulnerability VCID-k6s1-gnmc-e3ed
28
vulnerability VCID-mm3u-a8ar-b3hp
29
vulnerability VCID-p1dq-27t5-e7b3
30
vulnerability VCID-pv1d-wrex-hbgy
31
vulnerability VCID-qm34-ec8s-tfd7
32
vulnerability VCID-qzba-9xmg-3qer
33
vulnerability VCID-sbr6-pybe-dubq
34
vulnerability VCID-spwd-dz6f-5fh9
35
vulnerability VCID-t8ec-st1v-s3e5
36
vulnerability VCID-ttm3-5a6e-wfa1
37
vulnerability VCID-ukxp-wqpr-t3by
38
vulnerability VCID-ura5-t7s9-8fck
39
vulnerability VCID-w2dv-u8h6-sbgs
40
vulnerability VCID-w4pr-k5nj-ckgy
41
vulnerability VCID-x4ev-6zjm-sbe4
42
vulnerability VCID-x516-xwze-6ba3
43
vulnerability VCID-xtqq-9751-r3dq
44
vulnerability VCID-yemh-qd63-wuca
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@1.1
aliases CVE-2009-2659, GHSA-9xg7-gg9m-rmq9, PYSEC-2009-3
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66kq-hbhe-9ba3
1
url VCID-8b12-22bg-jkch
vulnerability_id VCID-8b12-22bg-jkch
summary The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5712.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5712
reference_id
reference_type
scores
0
value 0.01815
scoring_system epss
scoring_elements 0.82782
published_at 2026-04-01T12:55:00Z
1
value 0.01815
scoring_system epss
scoring_elements 0.82846
published_at 2026-04-13T12:55:00Z
2
value 0.01815
scoring_system epss
scoring_elements 0.8285
published_at 2026-04-12T12:55:00Z
3
value 0.01815
scoring_system epss
scoring_elements 0.82855
published_at 2026-04-11T12:55:00Z
4
value 0.01815
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-09T12:55:00Z
5
value 0.01815
scoring_system epss
scoring_elements 0.82832
published_at 2026-04-08T12:55:00Z
6
value 0.01815
scoring_system epss
scoring_elements 0.82807
published_at 2026-04-07T12:55:00Z
7
value 0.01815
scoring_system epss
scoring_elements 0.82812
published_at 2026-04-04T12:55:00Z
8
value 0.01815
scoring_system epss
scoring_elements 0.82798
published_at 2026-04-02T12:55:00Z
9
value 0.01815
scoring_system epss
scoring_elements 0.82908
published_at 2026-04-24T12:55:00Z
10
value 0.01815
scoring_system epss
scoring_elements 0.82886
published_at 2026-04-21T12:55:00Z
11
value 0.01815
scoring_system epss
scoring_elements 0.82884
published_at 2026-04-18T12:55:00Z
12
value 0.01815
scoring_system epss
scoring_elements 0.82885
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5712
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5712
3
reference_url http://secunia.com/advisories/27435
reference_id
reference_type
scores
url http://secunia.com/advisories/27435
4
reference_url http://secunia.com/advisories/27597
reference_id
reference_type
scores
url http://secunia.com/advisories/27597
5
reference_url http://secunia.com/advisories/31961
reference_id
reference_type
scores
url http://secunia.com/advisories/31961
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
7
reference_url https://github.com/django/django
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django
8
reference_url https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
9
reference_url https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
10
reference_url https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
11
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
12
reference_url http://sourceforge.net/forum/forum.php?forum_id=749199
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://sourceforge.net/forum/forum.php?forum_id=749199
13
reference_url https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
14
reference_url https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
15
reference_url https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
16
reference_url https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
19
reference_url http://www.debian.org/security/2008/dsa-1640
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2008/dsa-1640
20
reference_url http://www.djangoproject.com/weblog/2007/oct/26/security-fix
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.djangoproject.com/weblog/2007/oct/26/security-fix
21
reference_url http://www.securityfocus.com/bid/26227
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/26227
22
reference_url http://www.vupen.com/english/advisories/2007/3660
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3660
23
reference_url http://www.vupen.com/english/advisories/2007/3661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3661
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=357051
reference_id 357051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=357051
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448838
reference_id 448838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448838
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-5712
reference_id CVE-2007-5712
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2007-5712
27
reference_url https://github.com/advisories/GHSA-9v8h-57gv-qch6
reference_id GHSA-9v8h-57gv-qch6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9v8h-57gv-qch6
fixed_packages
0
url pkg:pypi/django@0.96.1
purl pkg:pypi/django@0.96.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@0.96.1
1
url pkg:pypi/django@1.1
purl pkg:pypi/django@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pvd-3217-6ygv
1
vulnerability VCID-2dhb-9yue-33h7
2
vulnerability VCID-2m9f-3cgw-ekdr
3
vulnerability VCID-325d-7dfk-sqd2
4
vulnerability VCID-42cm-j2av-87ea
5
vulnerability VCID-47er-pm3z-qfh3
6
vulnerability VCID-5g4y-1qmy-27bd
7
vulnerability VCID-6gss-ppm5-3yc9
8
vulnerability VCID-7bu3-ckpj-gbf8
9
vulnerability VCID-84mm-45p6-xkau
10
vulnerability VCID-896g-hqec-ryb9
11
vulnerability VCID-8jaq-53td-wbeg
12
vulnerability VCID-8teq-9xr9-q3fg
13
vulnerability VCID-9uzd-mmyv-mfh4
14
vulnerability VCID-a6d1-p4q6-fyav
15
vulnerability VCID-a715-2qks-wyhn
16
vulnerability VCID-bgmv-mf3x-bkew
17
vulnerability VCID-br5x-v7md-47hp
18
vulnerability VCID-c1n5-4ars-u7ff
19
vulnerability VCID-czkz-mcv8-mqfc
20
vulnerability VCID-e2jd-yd4j-kqgt
21
vulnerability VCID-eker-m822-cuax
22
vulnerability VCID-fw2d-s2rt-syfz
23
vulnerability VCID-g56k-prrj-aqb1
24
vulnerability VCID-hugz-zq5c-pugn
25
vulnerability VCID-jc9f-vgy8-ruan
26
vulnerability VCID-jumh-hkhx-7qc9
27
vulnerability VCID-k6s1-gnmc-e3ed
28
vulnerability VCID-mm3u-a8ar-b3hp
29
vulnerability VCID-p1dq-27t5-e7b3
30
vulnerability VCID-pv1d-wrex-hbgy
31
vulnerability VCID-qm34-ec8s-tfd7
32
vulnerability VCID-qzba-9xmg-3qer
33
vulnerability VCID-sbr6-pybe-dubq
34
vulnerability VCID-spwd-dz6f-5fh9
35
vulnerability VCID-t8ec-st1v-s3e5
36
vulnerability VCID-ttm3-5a6e-wfa1
37
vulnerability VCID-ukxp-wqpr-t3by
38
vulnerability VCID-ura5-t7s9-8fck
39
vulnerability VCID-w2dv-u8h6-sbgs
40
vulnerability VCID-w4pr-k5nj-ckgy
41
vulnerability VCID-x4ev-6zjm-sbe4
42
vulnerability VCID-x516-xwze-6ba3
43
vulnerability VCID-xtqq-9751-r3dq
44
vulnerability VCID-yemh-qd63-wuca
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@1.1
aliases CVE-2007-5712, GHSA-9v8h-57gv-qch6, PYSEC-2007-1
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8b12-22bg-jkch
2
url VCID-rkt5-kwum-43c8
vulnerability_id VCID-rkt5-kwum-43c8
summary The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.
references
0
reference_url http://osvdb.org/47906
reference_id
reference_type
scores
url http://osvdb.org/47906
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3909
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.58062
published_at 2026-04-11T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.57908
published_at 2026-04-01T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.57992
published_at 2026-04-02T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58012
published_at 2026-04-04T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.57987
published_at 2026-04-07T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-08T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58045
published_at 2026-04-09T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-13T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58041
published_at 2026-04-12T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.5805
published_at 2026-04-16T12:55:00Z
10
value 0.00383
scoring_system epss
scoring_elements 0.59638
published_at 2026-04-24T12:55:00Z
11
value 0.00383
scoring_system epss
scoring_elements 0.59668
published_at 2026-04-21T12:55:00Z
12
value 0.00383
scoring_system epss
scoring_elements 0.59684
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3909
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=460966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=460966
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3909
4
reference_url http://secunia.com/advisories/31837
reference_id
reference_type
scores
url http://secunia.com/advisories/31837
5
reference_url http://secunia.com/advisories/31961
reference_id
reference_type
scores
url http://secunia.com/advisories/31961
6
reference_url https://github.com/django/django
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django
7
reference_url https://github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752
8
reference_url https://github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e
9
reference_url https://github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81
10
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2008-2.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2008-2.yaml
11
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00091.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00091.html
12
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00131.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00131.html
13
reference_url http://www.debian.org/security/2008/dsa-1640
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2008/dsa-1640
14
reference_url http://www.djangoproject.com/weblog/2008/sep/02/security
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.djangoproject.com/weblog/2008/sep/02/security
15
reference_url http://www.djangoproject.com/weblog/2008/sep/02/security/
reference_id
reference_type
scores
url http://www.djangoproject.com/weblog/2008/sep/02/security/
16
reference_url http://www.openwall.com/lists/oss-security/2008/09/03/4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2008/09/03/4
17
reference_url http://www.vupen.com/english/advisories/2008/2533
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2533
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*
reference_id cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*
reference_id cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3909
reference_id CVE-2008-3909
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2008-3909
22
reference_url https://github.com/advisories/GHSA-r5cj-wv24-92p5
reference_id GHSA-r5cj-wv24-92p5
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r5cj-wv24-92p5
fixed_packages
0
url pkg:pypi/django@0.96.3
purl pkg:pypi/django@0.96.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@0.96.3
1
url pkg:pypi/django@1.1
purl pkg:pypi/django@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pvd-3217-6ygv
1
vulnerability VCID-2dhb-9yue-33h7
2
vulnerability VCID-2m9f-3cgw-ekdr
3
vulnerability VCID-325d-7dfk-sqd2
4
vulnerability VCID-42cm-j2av-87ea
5
vulnerability VCID-47er-pm3z-qfh3
6
vulnerability VCID-5g4y-1qmy-27bd
7
vulnerability VCID-6gss-ppm5-3yc9
8
vulnerability VCID-7bu3-ckpj-gbf8
9
vulnerability VCID-84mm-45p6-xkau
10
vulnerability VCID-896g-hqec-ryb9
11
vulnerability VCID-8jaq-53td-wbeg
12
vulnerability VCID-8teq-9xr9-q3fg
13
vulnerability VCID-9uzd-mmyv-mfh4
14
vulnerability VCID-a6d1-p4q6-fyav
15
vulnerability VCID-a715-2qks-wyhn
16
vulnerability VCID-bgmv-mf3x-bkew
17
vulnerability VCID-br5x-v7md-47hp
18
vulnerability VCID-c1n5-4ars-u7ff
19
vulnerability VCID-czkz-mcv8-mqfc
20
vulnerability VCID-e2jd-yd4j-kqgt
21
vulnerability VCID-eker-m822-cuax
22
vulnerability VCID-fw2d-s2rt-syfz
23
vulnerability VCID-g56k-prrj-aqb1
24
vulnerability VCID-hugz-zq5c-pugn
25
vulnerability VCID-jc9f-vgy8-ruan
26
vulnerability VCID-jumh-hkhx-7qc9
27
vulnerability VCID-k6s1-gnmc-e3ed
28
vulnerability VCID-mm3u-a8ar-b3hp
29
vulnerability VCID-p1dq-27t5-e7b3
30
vulnerability VCID-pv1d-wrex-hbgy
31
vulnerability VCID-qm34-ec8s-tfd7
32
vulnerability VCID-qzba-9xmg-3qer
33
vulnerability VCID-sbr6-pybe-dubq
34
vulnerability VCID-spwd-dz6f-5fh9
35
vulnerability VCID-t8ec-st1v-s3e5
36
vulnerability VCID-ttm3-5a6e-wfa1
37
vulnerability VCID-ukxp-wqpr-t3by
38
vulnerability VCID-ura5-t7s9-8fck
39
vulnerability VCID-w2dv-u8h6-sbgs
40
vulnerability VCID-w4pr-k5nj-ckgy
41
vulnerability VCID-x4ev-6zjm-sbe4
42
vulnerability VCID-x516-xwze-6ba3
43
vulnerability VCID-xtqq-9751-r3dq
44
vulnerability VCID-yemh-qd63-wuca
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/django@1.1
aliases CVE-2008-3909, GHSA-r5cj-wv24-92p5, PYSEC-2008-2
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rkt5-kwum-43c8
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/django@0.96.0