| Fixing_vulnerabilities |
| 0 |
| url |
VCID-3sac-ah8j-pucd |
| vulnerability_id |
VCID-3sac-ah8j-pucd |
| summary |
Django SQL injection in HasKey(lhs, rhs) on Oracle
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53908 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71753 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.7171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71697 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.7167 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.7172 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71728 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00687 |
| scoring_system |
epss |
| scoring_elements |
0.71679 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53908 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 6 |
|
| 7 |
| reference_url |
https://groups.google.com/g/django-announce |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-06T16:19:13Z/ |
|
|
| url |
https://groups.google.com/g/django-announce |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
BIT-django-2024-53908, CVE-2024-53908, GHSA-m9g8-fxxm-xg86, PYSEC-2024-157
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3sac-ah8j-pucd |
|
| 1 |
| url |
VCID-6hfy-2gcp-1uh4 |
| vulnerability_id |
VCID-6hfy-2gcp-1uh4 |
| summary |
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16984 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.7252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72478 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72488 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72483 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.7247 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72437 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72455 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16984 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/advisories/GHSA-6mx3-3vqg-hpp2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-6mx3-3vqg-hpp2 |
|
| 4 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16984, GHSA-6mx3-3vqg-hpp2, PYSEC-2018-3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6hfy-2gcp-1uh4 |
|
| 2 |
| url |
VCID-78r4-85ms-63hm |
| vulnerability_id |
VCID-78r4-85ms-63hm |
| summary |
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87759 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87735 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87746 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.03582 |
| scoring_system |
epss |
| scoring_elements |
0.877 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46695 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
BIT-django-2023-46695, CVE-2023-46695, GHSA-qmf9-6jqf-j8fq, PYSEC-2023-222
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-78r4-85ms-63hm |
|
| 3 |
| url |
VCID-84mm-45p6-xkau |
| vulnerability_id |
VCID-84mm-45p6-xkau |
| summary |
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.
NFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64458 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05432 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05452 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05459 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05438 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0548 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07235 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64458 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-64458, GHSA-qw25-v68c-qjf3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-84mm-45p6-xkau |
|
| 4 |
| url |
VCID-e9k9-1s9f-dbgv |
| vulnerability_id |
VCID-e9k9-1s9f-dbgv |
| summary |
Django has Inefficient Algorithmic Complexity
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Jiyong Yang for reporting this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14550 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18625 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18621 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18568 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18487 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18771 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19314 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14550 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://groups.google.com/g/django-announce |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T16:27:25Z/ |
|
|
| url |
https://groups.google.com/g/django-announce |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14550, GHSA-33mw-q7rj-mjwj
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e9k9-1s9f-dbgv |
|
| 5 |
| url |
VCID-fw2d-s2rt-syfz |
| vulnerability_id |
VCID-fw2d-s2rt-syfz |
| summary |
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0698 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72499 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.7245 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72462 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00719 |
| scoring_system |
epss |
| scoring_elements |
0.72434 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0698 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/advisories/GHSA-7g9h-c88w-r7h2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-7g9h-c88w-r7h2 |
|
| 4 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2011-0698 |
| reference_id |
CVE-2011-0698 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2011-0698 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0698, GHSA-7g9h-c88w-r7h2, PYSEC-2011-12
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fw2d-s2rt-syfz |
|
| 6 |
| url |
VCID-gan1-9gwu-63d2 |
| vulnerability_id |
VCID-gan1-9gwu-63d2 |
| summary |
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-35042 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.89973 |
| scoring_system |
epss |
| scoring_elements |
0.99577 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.89973 |
| scoring_system |
epss |
| scoring_elements |
0.99576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.89973 |
| scoring_system |
epss |
| scoring_elements |
0.9958 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.89973 |
| scoring_system |
epss |
| scoring_elements |
0.99579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.89973 |
| scoring_system |
epss |
| scoring_elements |
0.99578 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-35042 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/advisories/GHSA-xpfp-f569-q3p2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-xpfp-f569-q3p2 |
|
| 5 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
BIT-django-2021-35042, CVE-2021-35042, GHSA-xpfp-f569-q3p2, PYSEC-2021-109
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gan1-9gwu-63d2 |
|
| 7 |
| url |
VCID-khxh-hjmn-fbdq |
| vulnerability_id |
VCID-khxh-hjmn-fbdq |
| summary |
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3982 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45139 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45281 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4523 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45229 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45261 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45239 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4524 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3982 |
|
| 2 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3982, GHSA-6wgp-fwfm-mxp3, PYSEC-2015-19
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-khxh-hjmn-fbdq |
|
| 8 |
| url |
VCID-nda7-9219-6kce |
| vulnerability_id |
VCID-nda7-9219-6kce |
| summary |
Django vulnerable to Uncontrolled Resource Consumption
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.
`URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to cause denial of service via large URL inputs containing these characters.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00211 |
| scoring_system |
epss |
| scoring_elements |
0.43562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45804 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45754 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45745 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45775 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45753 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.457 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00229 |
| scoring_system |
epss |
| scoring_elements |
0.45751 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25673 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25673, GHSA-8p8v-wh79-9r56
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nda7-9219-6kce |
|
| 9 |
| url |
VCID-p9fd-1qx2-8ubc |
| vulnerability_id |
VCID-p9fd-1qx2-8ubc |
| summary |
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.views.LoginView, django.contrib.auth.views.LogoutView, and django.views.i18n.set_language are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-27556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38111 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.3809 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.381 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.3805 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.3818 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38157 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38108 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-27556 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
BIT-django-2025-27556, CVE-2025-27556, GHSA-wqfg-m96j-85vm, PYSEC-2025-14
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fd-1qx2-8ubc |
|
| 10 |
| url |
VCID-t8d7-68j2-suet |
| vulnerability_id |
VCID-t8d7-68j2-suet |
| summary |
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73791 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73784 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73781 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.7387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73828 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73836 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73854 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73832 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00787 |
| scoring_system |
epss |
| scoring_elements |
0.73819 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5145 |
|
| 2 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5145, GHSA-cqf7-ff9h-7967, PYSEC-2015-21
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t8d7-68j2-suet |
|
| 11 |
| url |
VCID-vwt9-q3dt-vbfg |
| vulnerability_id |
VCID-vwt9-q3dt-vbfg |
| summary |
Django is vulnerable to SQL injection in column aliases
An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27.
`FilteredRelation` is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet.annotate()` or `QuerySet.alias()` on PostgreSQL.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Stackered for reporting this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13372 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01173 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01184 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01181 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01188 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01201 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01194 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01203 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00835 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13372 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13372, GHSA-rqw2-ghq9-44m7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vwt9-q3dt-vbfg |
|
|