Search for packages
purl | pkg:alpm/archlinux/python-django@1.11.10-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-37rn-gt5b-aaab
Aliases: CVE-2018-7537 GHSA-2f9x-5v75-3qv4 PYSEC-2018-6 |
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. |
Affected by 0 other vulnerabilities. |
VCID-ean7-wkmd-aaac
Aliases: CVE-2018-7536 GHSA-r28v-mw67-m5p9 PYSEC-2018-5 |
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-qjx3-vgza-aaak | django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. |
CVE-2018-6188
GHSA-rf4j-j272-fj86 PYSEC-2018-4 |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:55.087593+00:00 | Arch Linux Importer | Fixing | VCID-qjx3-vgza-aaak | https://security.archlinux.org/AVG-624 | 36.0.0 |
2025-03-28T07:46:54.743025+00:00 | Arch Linux Importer | Affected by | VCID-ean7-wkmd-aaac | https://security.archlinux.org/AVG-649 | 36.0.0 |
2025-03-28T07:46:54.722318+00:00 | Arch Linux Importer | Affected by | VCID-37rn-gt5b-aaab | https://security.archlinux.org/AVG-649 | 36.0.0 |
2024-10-12T00:59:57.668841+00:00 | Arch Linux Importer | Affected by | VCID-ean7-wkmd-aaac | https://security.archlinux.org/AVG-649 | 34.0.2 |
2024-10-12T00:59:57.645606+00:00 | Arch Linux Importer | Affected by | VCID-37rn-gt5b-aaab | https://security.archlinux.org/AVG-649 | 34.0.2 |
2024-09-18T02:02:16.104937+00:00 | Arch Linux Importer | Fixing | VCID-qjx3-vgza-aaak | https://security.archlinux.org/AVG-624 | 34.0.1 |
2024-09-18T02:02:15.726712+00:00 | Arch Linux Importer | Affected by | VCID-ean7-wkmd-aaac | https://security.archlinux.org/AVG-649 | 34.0.1 |
2024-09-18T02:02:15.702128+00:00 | Arch Linux Importer | Affected by | VCID-37rn-gt5b-aaab | https://security.archlinux.org/AVG-649 | 34.0.1 |
2024-04-23T19:47:34.878031+00:00 | Arch Linux Importer | Affected by | VCID-ean7-wkmd-aaac | https://security.archlinux.org/AVG-649 | 34.0.0rc4 |
2024-04-23T19:47:34.856008+00:00 | Arch Linux Importer | Affected by | VCID-37rn-gt5b-aaab | https://security.archlinux.org/AVG-649 | 34.0.0rc4 |
2024-01-03T22:28:18.099796+00:00 | Arch Linux Importer | Fixing | VCID-qjx3-vgza-aaak | https://security.archlinux.org/AVG-624 | 34.0.0rc1 |
2024-01-03T22:28:17.736457+00:00 | Arch Linux Importer | Affected by | VCID-ean7-wkmd-aaac | https://security.archlinux.org/AVG-649 | 34.0.0rc1 |
2024-01-03T22:28:17.712230+00:00 | Arch Linux Importer | Affected by | VCID-37rn-gt5b-aaab | https://security.archlinux.org/AVG-649 | 34.0.0rc1 |