Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:ebuild/dev-python/django@5.2.1
purl pkg:ebuild/dev-python/django@5.2.1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (38)
Vulnerability Summary Aliases
VCID-3sac-ah8j-pucd Django SQL injection in HasKey(lhs, rhs) on Oracle An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.) BIT-django-2024-53908
CVE-2024-53908
GHSA-m9g8-fxxm-xg86
PYSEC-2024-157
VCID-4ztz-fq98-5fh1 In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters. BIT-django-2023-41164
CVE-2023-41164
GHSA-7h4p-27mh-hmrw
PYSEC-2023-225
VCID-66w1-4zku-gyfp Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. BIT-django-2021-45452
CVE-2021-45452
GHSA-jrh2-hc4r-7jwx
PYSEC-2022-3
VCID-6gss-ppm5-3yc9 An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. BIT-django-2022-36359
CVE-2022-36359
GHSA-8x94-hmjh-97hq
PYSEC-2022-245
VCID-7tca-pgcs-cuhd In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. BIT-django-2022-41323
CVE-2022-41323
GHSA-qrw5-5h28-6cmg
PYSEC-2022-304
VCID-7tph-k8q2-bue2 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. BIT-django-2024-41991
CVE-2024-41991
GHSA-r836-hh6v-rg5g
PYSEC-2024-69
VCID-8xgs-8xjr-cber An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings. BIT-django-2024-24680
CVE-2024-24680
GHSA-xxj9-f6rv-m3x4
PYSEC-2024-28
VCID-9abh-apwm-ebab An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). BIT-django-2025-32873
CVE-2025-32873
GHSA-8j24-cjrq-gr2m
PYSEC-2025-37
VCID-9k9t-vp1a-z7bt In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. BIT-django-2021-3281
CVE-2021-3281
GHSA-fvgf-6h6h-3322
PYSEC-2021-9
VCID-c8s7-3g9m-d3cw In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . BIT-django-2021-33571
CVE-2021-33571
GHSA-p99v-5w3c-jqq9
PYSEC-2021-99
VCID-e2jd-yd4j-kqgt Django allows enumeration of user e-mail addresses An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing). CVE-2024-45231
GHSA-rrqc-c2jx-6jgv
VCID-e87q-1j8h-93hh An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.) BIT-django-2024-56374
CVE-2024-56374
GHSA-qcgg-j2x8-h9g8
PYSEC-2025-1
VCID-gan1-9gwu-63d2 Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. BIT-django-2021-35042
CVE-2021-35042
GHSA-xpfp-f569-q3p2
PYSEC-2021-109
VCID-gp5e-nguh-5fdk An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. BIT-django-2022-23833
CVE-2022-23833
GHSA-6cw3-g6wv-c2xv
PYSEC-2022-20
VCID-hwa2-n7a2-pyg1 An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. BIT-django-2021-45116
CVE-2021-45116
GHSA-8c5j-9r9f-c6w8
PYSEC-2022-2
VCID-jh1e-72hp-fuf4 In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665. BIT-django-2024-27351
CVE-2024-27351
GHSA-vm8q-m57g-pff3
PYSEC-2024-47
VCID-jzae-1awh-k7cm An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets. BIT-django-2024-38875
CVE-2024-38875
GHSA-qg2p-9jwr-mmqf
PYSEC-2024-56
VCID-kypj-ptb9-8qhz In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. BIT-django-2021-31542
CVE-2021-31542
GHSA-rxjp-mfm9-w4wr
PYSEC-2021-7
VCID-m91a-6235-nye9 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg. BIT-django-2024-42005
CVE-2024-42005
GHSA-pv4p-cwwg-4rph
PYSEC-2024-70
VCID-mga4-an1w-qqf9 Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. BIT-django-2024-45230
CVE-2024-45230
GHSA-5hgc-2vfp-mqvc
PYSEC-2024-102
VCID-mzdk-m12w-q3fc In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. BIT-django-2021-44420
CVE-2021-44420
GHSA-v6rh-hp5x-86rv
PYSEC-2021-439
VCID-nese-5485-hkbs In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. BIT-django-2023-23969
CVE-2023-23969
GHSA-q2jf-h9jm-m7p4
PYSEC-2023-12
VCID-pa75-6avj-duf7 An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. BIT-django-2022-28346
CVE-2022-28346
GHSA-2gwj-7jmv-h26r
PYSEC-2022-190
VCID-q12d-kv8p-8ff7 An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password. BIT-django-2024-39329
CVE-2024-39329
GHSA-x7q2-wr7g-xqmf
PYSEC-2024-57
VCID-qm34-ec8s-tfd7 Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. BIT-django-2021-33203
CVE-2021-33203
GHSA-68w8-qjq3-2gfm
PYSEC-2021-98
VCID-t6uc-dfrd-jyfg An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. BIT-django-2022-34265
CVE-2022-34265
GHSA-p64x-8rxx-wf6q
PYSEC-2022-213
VCID-th9v-dk98-3kea A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. BIT-django-2022-28347
CVE-2022-28347
GHSA-w24h-v9qh-8gxj
PYSEC-2022-191
VCID-u3zk-tff2-aua9 An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters. BIT-django-2024-39614
CVE-2024-39614
GHSA-f6f8-9mx6-9mx2
PYSEC-2024-59
VCID-u7m5-tzv2-c7hn In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. BIT-django-2021-28658
CVE-2021-28658
GHSA-xgxc-v2qg-chmh
PYSEC-2021-6
VCID-ume2-wt6y-jye7 The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. BIT-django-2022-22818
CVE-2022-22818
GHSA-95rw-fx8r-36v6
PYSEC-2022-19
VCID-v1xr-z4zu-yfb4 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent. BIT-django-2024-41989
CVE-2024-41989
GHSA-jh75-99hh-qvx9
PYSEC-2024-67
VCID-v4ad-xxy8-wfc9 In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. BIT-django-2021-32052
CVE-2021-32052
GHSA-qm57-vhq3-3fwf
PYSEC-2021-8
VCID-wwa5-mhgu-9khz Django denial-of-service in django.utils.html.strip_tags() An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities. CVE-2024-53907
GHSA-8498-2h75-472j
VCID-xgv1-s2ek-q3dp An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20. The django.utils.text.wrap() method and wordwrap template filter are subject to a potential denial-of-service attack when used with very long strings. BIT-django-2025-26699
CVE-2025-26699
GHSA-p3fp-8748-vqfq
PYSEC-2025-13
VCID-xhpa-mffz-syfy An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. BIT-django-2024-41990
CVE-2024-41990
GHSA-795c-9xpc-xw6g
PYSEC-2024-68
VCID-ypub-ukuh-p3aw An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack. BIT-django-2023-24580
CVE-2023-24580
GHSA-2hrw-hx67-34x6
PYSEC-2023-13
VCID-z27q-zfpz-ckby An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.) BIT-django-2024-39330
CVE-2024-39330
GHSA-9jmf-237g-qf46
PYSEC-2024-58
VCID-z8z1-cjee-kfeg An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack. BIT-django-2021-45115
CVE-2021-45115
GHSA-53qw-q765-4fww
PYSEC-2022-1

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:14:16.239724+00:00 Gentoo Importer Fixing VCID-9abh-apwm-ebab https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.224388+00:00 Gentoo Importer Fixing VCID-xgv1-s2ek-q3dp https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.208513+00:00 Gentoo Importer Fixing VCID-e87q-1j8h-93hh https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.193489+00:00 Gentoo Importer Fixing VCID-3sac-ah8j-pucd https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.176711+00:00 Gentoo Importer Fixing VCID-wwa5-mhgu-9khz https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.160791+00:00 Gentoo Importer Fixing VCID-e2jd-yd4j-kqgt https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.145841+00:00 Gentoo Importer Fixing VCID-mga4-an1w-qqf9 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.130602+00:00 Gentoo Importer Fixing VCID-m91a-6235-nye9 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.115195+00:00 Gentoo Importer Fixing VCID-7tph-k8q2-bue2 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.100060+00:00 Gentoo Importer Fixing VCID-xhpa-mffz-syfy https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.084765+00:00 Gentoo Importer Fixing VCID-v1xr-z4zu-yfb4 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.069732+00:00 Gentoo Importer Fixing VCID-u3zk-tff2-aua9 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.054949+00:00 Gentoo Importer Fixing VCID-z27q-zfpz-ckby https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.039804+00:00 Gentoo Importer Fixing VCID-q12d-kv8p-8ff7 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.024710+00:00 Gentoo Importer Fixing VCID-jzae-1awh-k7cm https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:16.009585+00:00 Gentoo Importer Fixing VCID-jh1e-72hp-fuf4 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.994723+00:00 Gentoo Importer Fixing VCID-8xgs-8xjr-cber https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.979705+00:00 Gentoo Importer Fixing VCID-4ztz-fq98-5fh1 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.964463+00:00 Gentoo Importer Fixing VCID-ypub-ukuh-p3aw https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.949211+00:00 Gentoo Importer Fixing VCID-nese-5485-hkbs https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.931806+00:00 Gentoo Importer Fixing VCID-7tca-pgcs-cuhd https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.915811+00:00 Gentoo Importer Fixing VCID-6gss-ppm5-3yc9 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.898406+00:00 Gentoo Importer Fixing VCID-t6uc-dfrd-jyfg https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.883215+00:00 Gentoo Importer Fixing VCID-th9v-dk98-3kea https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.868056+00:00 Gentoo Importer Fixing VCID-pa75-6avj-duf7 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.851291+00:00 Gentoo Importer Fixing VCID-gp5e-nguh-5fdk https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.836236+00:00 Gentoo Importer Fixing VCID-ume2-wt6y-jye7 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.821144+00:00 Gentoo Importer Fixing VCID-66w1-4zku-gyfp https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.806129+00:00 Gentoo Importer Fixing VCID-hwa2-n7a2-pyg1 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.790587+00:00 Gentoo Importer Fixing VCID-z8z1-cjee-kfeg https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.775486+00:00 Gentoo Importer Fixing VCID-mzdk-m12w-q3fc https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.759994+00:00 Gentoo Importer Fixing VCID-gan1-9gwu-63d2 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.744830+00:00 Gentoo Importer Fixing VCID-c8s7-3g9m-d3cw https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.729795+00:00 Gentoo Importer Fixing VCID-qm34-ec8s-tfd7 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.714596+00:00 Gentoo Importer Fixing VCID-v4ad-xxy8-wfc9 https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.699623+00:00 Gentoo Importer Fixing VCID-kypj-ptb9-8qhz https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.682760+00:00 Gentoo Importer Fixing VCID-u7m5-tzv2-c7hn https://security.gentoo.org/glsa/202509-03 38.0.0
2026-04-01T13:14:15.666679+00:00 Gentoo Importer Fixing VCID-9k9t-vp1a-z7bt https://security.gentoo.org/glsa/202509-03 38.0.0