Search for packages
Package details: pkg:alpm/archlinux/python-django@1.11.10-1
purl pkg:alpm/archlinux/python-django@1.11.10-1
Next non-vulnerable version 1.11.11-1
Latest non-vulnerable version 5.1.11-1
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-37rn-gt5b-aaab
Aliases:
CVE-2018-7537
GHSA-2f9x-5v75-3qv4
PYSEC-2018-6
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
1.11.11-1
Affected by 0 other vulnerabilities.
VCID-ean7-wkmd-aaac
Aliases:
CVE-2018-7536
GHSA-r28v-mw67-m5p9
PYSEC-2018-5
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
1.11.11-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-qjx3-vgza-aaak django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. CVE-2018-6188
GHSA-rf4j-j272-fj86
PYSEC-2018-4

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:46:55.087593+00:00 Arch Linux Importer Fixing VCID-qjx3-vgza-aaak https://security.archlinux.org/AVG-624 36.0.0
2025-03-28T07:46:54.743025+00:00 Arch Linux Importer Affected by VCID-ean7-wkmd-aaac https://security.archlinux.org/AVG-649 36.0.0
2025-03-28T07:46:54.722318+00:00 Arch Linux Importer Affected by VCID-37rn-gt5b-aaab https://security.archlinux.org/AVG-649 36.0.0
2024-10-12T00:59:57.668841+00:00 Arch Linux Importer Affected by VCID-ean7-wkmd-aaac https://security.archlinux.org/AVG-649 34.0.2
2024-10-12T00:59:57.645606+00:00 Arch Linux Importer Affected by VCID-37rn-gt5b-aaab https://security.archlinux.org/AVG-649 34.0.2
2024-09-18T02:02:16.104937+00:00 Arch Linux Importer Fixing VCID-qjx3-vgza-aaak https://security.archlinux.org/AVG-624 34.0.1
2024-09-18T02:02:15.726712+00:00 Arch Linux Importer Affected by VCID-ean7-wkmd-aaac https://security.archlinux.org/AVG-649 34.0.1
2024-09-18T02:02:15.702128+00:00 Arch Linux Importer Affected by VCID-37rn-gt5b-aaab https://security.archlinux.org/AVG-649 34.0.1
2024-04-23T19:47:34.878031+00:00 Arch Linux Importer Affected by VCID-ean7-wkmd-aaac https://security.archlinux.org/AVG-649 34.0.0rc4
2024-04-23T19:47:34.856008+00:00 Arch Linux Importer Affected by VCID-37rn-gt5b-aaab https://security.archlinux.org/AVG-649 34.0.0rc4
2024-01-03T22:28:18.099796+00:00 Arch Linux Importer Fixing VCID-qjx3-vgza-aaak https://security.archlinux.org/AVG-624 34.0.0rc1
2024-01-03T22:28:17.736457+00:00 Arch Linux Importer Affected by VCID-ean7-wkmd-aaac https://security.archlinux.org/AVG-649 34.0.0rc1
2024-01-03T22:28:17.712230+00:00 Arch Linux Importer Affected by VCID-37rn-gt5b-aaab https://security.archlinux.org/AVG-649 34.0.0rc1