Skip to content
Projeler
Gruplar
Parçacıklar
Yardım
Yükleniyor...
Oturum aç / Kaydol
Gezinmeyi değiştir
D
django
Proje
Proje
Ayrıntılar
Etkinlik
Cycle Analytics
Depo (repository)
Depo (repository)
Dosyalar
Kayıtlar (commit)
Dallar (branch)
Etiketler
Katkıda bulunanlar
Grafik
Karşılaştır
Grafikler
Konular (issue)
0
Konular (issue)
0
Liste
Pano
Etiketler
Kilometre Taşları
Birleştirme (merge) Talepleri
0
Birleştirme (merge) Talepleri
0
CI / CD
CI / CD
İş akışları (pipeline)
İşler
Zamanlamalar
Grafikler
Paketler
Paketler
Wiki
Wiki
Parçacıklar
Parçacıklar
Üyeler
Üyeler
Collapse sidebar
Close sidebar
Etkinlik
Grafik
Grafikler
Yeni bir konu (issue) oluştur
İşler
Kayıtlar (commit)
Konu (issue) Panoları
Kenar çubuğunu aç
Batuhan Osman TASKAYA
django
Commits
c34c6d0a
Kaydet (Commit)
c34c6d0a
authored
Şub 01, 2019
tarafından
Tim Graham
Kaydeden (comit)
Carlton Gibson
Şub 01, 2019
Dosyalara gözat
Seçenekler
Dosyalara Gözat
İndir
Eposta Yamaları
Sade Fark
Used extlinks for GitHub commits.
üst
75d62788
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
172 additions
and
173 deletions
+172
-173
conf.py
docs/conf.py
+1
-0
howto-release-django.txt
docs/internals/howto-release-django.txt
+1
-3
security.txt
docs/releases/security.txt
+170
-170
No files found.
docs/conf.py
Dosyayı görüntüle @
c34c6d0a
...
...
@@ -44,6 +44,7 @@ extensions = [
]
extlinks
=
{
'commit'
:
(
'https://github.com/django/django/commit/
%
s'
,
''
),
'cve'
:
(
'https://nvd.nist.gov/view/vuln/detail?vulnId=
%
s'
,
'CVE-'
),
'ticket'
:
(
'https://code.djangoproject.com/ticket/
%
s'
,
'#'
),
}
...
...
docs/internals/howto-release-django.txt
Dosyayı görüntüle @
c34c6d0a
...
...
@@ -179,9 +179,7 @@ OK, this is the fun part, where we actually push out a release!
checkout security/1.5.x; git rebase stable/1.5.x``) and then switch back and
do the merge. Make sure the commit message for each security fix explains
that the commit is a security fix and that an announcement will follow
(`example security commit`__).
__ https://github.com/django/django/commit/3ef4bbf495cc6c061789132e3d50a8231a89406b
(:commit:`example security commit <bf39978a53f117ca02e9a0c78b76664a41a54745>`).
#. For a feature release, remove the ``UNDER DEVELOPMENT`` header at the
top of the release notes and add the release date on the next line. For a
...
...
docs/releases/security.txt
Dosyayı görüntüle @
c34c6d0a
...
...
@@ -46,9 +46,9 @@ Filename validation issue in translation framework. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.90
`(patch) <https://github.com/django/django/commit/518d406e53>`__
* Django 0.91
`(patch) <https://github.com/django/django/commit/518d406e53>`__
* Django 0.95
`(patch) <https://github.com/django/django/commit/a132d411c6>`__
(released January 21 2007)
* Django 0.90
:commit:`(patch) <518d406e53>`
* Django 0.91
:commit:`(patch) <518d406e53>`
* Django 0.95
:commit:`(patch) <a132d411c6>`
(released January 21 2007)
January 21, 2007 - :cve:`2007-0405`
-----------------------------------
...
...
@@ -59,7 +59,7 @@ Apparent "caching" of authenticated user. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.95
`(patch) <https://github.com/django/django/commit/e89f0a6558>`__
* Django 0.95
:commit:`(patch) <e89f0a6558>`
Issues under Django's security process
======================================
...
...
@@ -76,9 +76,9 @@ description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.91
`(patch) <https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81>`__
* Django 0.95
`(patch) <https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234>`__
* Django 0.96
`(patch) <https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`__
* Django 0.91
:commit:`(patch) <8bc36e726c9e8c75c681d3ad232df8e882aaac81>`
* Django 0.95
:commit:`(patch) <412ed22502e11c50dbfee854627594f0e7e2c234>`
* Django 0.96
:commit:`(patch) <7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`
May 14, 2008 - :cve:`2008-2302`
-------------------------------
...
...
@@ -89,9 +89,9 @@ XSS via admin login redirect. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.91
`(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
* Django 0.95
`(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
* Django 0.96
`(patch) <https://github.com/django/django/commit/7791e5c050>`__
* Django 0.91
:commit:`(patch) <50ce7fb57d>`
* Django 0.95
:commit:`(patch) <50ce7fb57d>`
* Django 0.96
:commit:`(patch) <7791e5c050>`
September 2, 2008 - :cve:`2008-3909`
------------------------------------
...
...
@@ -102,9 +102,9 @@ CSRF via preservation of POST data during admin login. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.91
`(patch) <https://github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752>`__
* Django 0.95
`(patch) <https://github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81>`__
* Django 0.96
`(patch) <https://github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e>`__
* Django 0.91
:commit:`(patch) <44debfeaa4473bd28872c735dd3d9afde6886752>`
* Django 0.95
:commit:`(patch) <aee48854a164382c655acb9f18b3c06c3d238e81>`
* Django 0.96
:commit:`(patch) <7e0972bded362bc4b851c109df2c8a6548481a8e>`
July 28, 2009 - :cve:`2009-2659`
--------------------------------
...
...
@@ -115,8 +115,8 @@ Directory-traversal in development server media handler. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 0.96
`(patch) <https://github.com/django/django/commit/da85d76fd6>`__
* Django 1.0
`(patch) <https://github.com/django/django/commit/df7f917b7f>`__
* Django 0.96
:commit:`(patch) <da85d76fd6>`
* Django 1.0
:commit:`(patch) <df7f917b7f>`
October 9, 2009 - :cve:`2009-3965`
----------------------------------
...
...
@@ -127,8 +127,8 @@ description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.0
`(patch) <https://github.com/django/django/commit/594a28a904>`__
* Django 1.1
`(patch) <https://github.com/django/django/commit/e3e992e18b>`__
* Django 1.0
:commit:`(patch) <594a28a904>`
* Django 1.1
:commit:`(patch) <e3e992e18b>`
September 8, 2010 - :cve:`2010-3082`
------------------------------------
...
...
@@ -139,7 +139,7 @@ XSS via trusting unsafe cookie value. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.2
`(patch) <https://github.com/django/django/commit/7f84657b6b>`__
* Django 1.2
:commit:`(patch) <7f84657b6b>`
December 22, 2010 - :cve:`2010-4534`
------------------------------------
...
...
@@ -150,8 +150,8 @@ Information leakage in administrative interface. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.1
`(patch) <https://github.com/django/django/commit/17084839fd>`__
* Django 1.2
`(patch) <https://github.com/django/django/commit/85207a245b>`__
* Django 1.1
:commit:`(patch) <17084839fd>`
* Django 1.2
:commit:`(patch) <85207a245b>`
December 22, 2010 - :cve:`2010-4535`
------------------------------------
...
...
@@ -162,8 +162,8 @@ Denial-of-service in password-reset mechanism. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.1
`(patch) <https://github.com/django/django/commit/7f8dd9cbac>`__
* Django 1.2
`(patch) <https://github.com/django/django/commit/d5d8942a16>`__
* Django 1.1
:commit:`(patch) <7f8dd9cbac>`
* Django 1.2
:commit:`(patch) <d5d8942a16>`
February 8, 2011 - :cve:`2011-0696`
-----------------------------------
...
...
@@ -174,8 +174,8 @@ CSRF via forged HTTP headers. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.1
`(patch) <https://github.com/django/django/commit/408c5c873c>`__
* Django 1.2
`(patch) <https://github.com/django/django/commit/818e70344e>`__
* Django 1.1
:commit:`(patch) <408c5c873c>`
* Django 1.2
:commit:`(patch) <818e70344e>`
February 8, 2011 - :cve:`2011-0697`
-----------------------------------
...
...
@@ -186,8 +186,8 @@ XSS via unsanitized names of uploaded files. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.1
`(patch) <https://github.com/django/django/commit/1966786d2d>`__
* Django 1.2
`(patch) <https://github.com/django/django/commit/1f814a9547>`__
* Django 1.1
:commit:`(patch) <1966786d2d>`
* Django 1.2
:commit:`(patch) <1f814a9547>`
February 8, 2011 - :cve:`2011-0698`
-----------------------------------
...
...
@@ -198,8 +198,8 @@ description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.1
`(patch) <https://github.com/django/django/commit/570a32a047>`__
* Django 1.2
`(patch) <https://github.com/django/django/commit/194566480b>`__
* Django 1.1
:commit:`(patch) <570a32a047>`
* Django 1.2
:commit:`(patch) <194566480b>`
September 9, 2011 - :cve:`2011-4136`
------------------------------------
...
...
@@ -210,8 +210,8 @@ Session manipulation when using memory-cache-backed session. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.2
`(patch) <https://github.com/django/django/commit/ac7c3a110f>`__
* Django 1.3
`(patch) <https://github.com/django/django/commit/fbe2eead2f>`__
* Django 1.2
:commit:`(patch) <ac7c3a110f>`
* Django 1.3
:commit:`(patch) <fbe2eead2f>`
September 9, 2011 - :cve:`2011-4137`
------------------------------------
...
...
@@ -222,8 +222,8 @@ Denial-of-service via ``URLField.verify_exists``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.2
`(patch) <https://github.com/django/django/commit/7268f8af86>`__
* Django 1.3
`(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
* Django 1.2
:commit:`(patch) <7268f8af86>`
* Django 1.3
:commit:`(patch) <1a76dbefdf>`
September 9, 2011 - :cve:`2011-4138`
------------------------------------
...
...
@@ -235,8 +235,8 @@ Information leakage/arbitrary request issuance via ``URLField.verify_exists``.
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.2:
`(patch) <https://github.com/django/django/commit/7268f8af86>`__
* Django 1.3:
`(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
* Django 1.2:
:commit:`(patch) <7268f8af86>`
* Django 1.3:
:commit:`(patch) <1a76dbefdf>`
September 9, 2011 - :cve:`2011-4139`
------------------------------------
...
...
@@ -247,8 +247,8 @@ September 9, 2011 - :cve:`2011-4139`
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.2
`(patch) <https://github.com/django/django/commit/c613af4d64>`__
* Django 1.3
`(patch) <https://github.com/django/django/commit/2f7fadc38e>`__
* Django 1.2
:commit:`(patch) <c613af4d64>`
* Django 1.3
:commit:`(patch) <2f7fadc38e>`
September 9, 2011 - :cve:`2011-4140`
------------------------------------
...
...
@@ -273,8 +273,8 @@ XSS via failure to validate redirect scheme. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3:
`(patch) <https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`__
* Django 1.4:
`(patch) <https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1>`__
* Django 1.3:
:commit:`(patch) <4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`
* Django 1.4:
:commit:`(patch) <e34685034b60be1112160e76091e5aee60149fa1>`
July 30, 2012 - :cve:`2012-3443`
--------------------------------
...
...
@@ -285,8 +285,8 @@ Denial-of-service via compressed image files. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3:
`(patch) <https://github.com/django/django/commit/b2eb4787a0fff9c9993b78be5c698e85108f3446>`__
* Django 1.4:
`(patch) <https://github.com/django/django/commit/c14f325c4eef628bc7bfd8873c3a72aeb0219141>`__
* Django 1.3:
:commit:`(patch) <b2eb4787a0fff9c9993b78be5c698e85108f3446>`
* Django 1.4:
:commit:`(patch) <c14f325c4eef628bc7bfd8873c3a72aeb0219141>`
July 30, 2012 - :cve:`2012-3444`
--------------------------------
...
...
@@ -297,8 +297,8 @@ Denial-of-service via large image files. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6>`__
* Django 1.3
:commit:`(patch) <9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`
* Django 1.4
:commit:`(patch) <da33d67181b53fe6cc737ac1220153814a1509f6>`
October 17, 2012 - :cve:`2012-4520`
-----------------------------------
...
...
@@ -309,8 +309,8 @@ October 17, 2012 - :cve:`2012-4520`
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3>`__
* Django 1.3
:commit:`(patch) <b45c377f8f488955e0c7069cad3f3dd21910b071>`
* Django 1.4
:commit:`(patch) <92d3430f12171f16f566c9050c40feefb830a4a3>`
December 10, 2012 - No CVE 1
----------------------------
...
...
@@ -321,8 +321,8 @@ Additional hardening of ``Host`` header handling. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/319627c184e71ae267d6b7f000e293168c7b6e09>`__
* Django 1.3
:commit:`(patch) <2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`
* Django 1.4
:commit:`(patch) <319627c184e71ae267d6b7f000e293168c7b6e09>`
December 10, 2012 - No CVE 2
----------------------------
...
...
@@ -333,8 +333,8 @@ Additional hardening of redirect validation. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3:
`(patch) <https://github.com/django/django/commit/1515eb46daa0897ba5ad5f0a2db8969255f1b343>`__
* Django 1.4:
`(patch) <https://github.com/django/django/commit/b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`__
* Django 1.3:
:commit:`(patch) <1515eb46daa0897ba5ad5f0a2db8969255f1b343>`
* Django 1.4:
:commit:`(patch) <b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`
February 19, 2013 - No CVE
--------------------------
...
...
@@ -345,8 +345,8 @@ Additional hardening of ``Host`` header handling. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`__
* Django 1.3
:commit:`(patch) <27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`
* Django 1.4
:commit:`(patch) <9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`
February 19, 2013 - :cve:`2013-1664` / :cve:`2013-1665`
-------------------------------------------------------
...
...
@@ -357,8 +357,8 @@ Entity-based attacks against Python XML libraries. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/d19a27066b2247102e65412aa66917aff0091112>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/1c60d07ba23e0350351c278ad28d0bd5aa410b40>`__
* Django 1.3
:commit:`(patch) <d19a27066b2247102e65412aa66917aff0091112>`
* Django 1.4
:commit:`(patch) <1c60d07ba23e0350351c278ad28d0bd5aa410b40>`
February 19, 2013 - :cve:`2013-0305`
------------------------------------
...
...
@@ -369,8 +369,8 @@ Information leakage via admin history log. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/d3a45e10c8ac8268899999129daa27652ec0da35>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/0e7861aec73702f7933ce2a93056f7983939f0d6>`__
* Django 1.3
:commit:`(patch) <d3a45e10c8ac8268899999129daa27652ec0da35>`
* Django 1.4
:commit:`(patch) <0e7861aec73702f7933ce2a93056f7983939f0d6>`
February 19, 2013 - :cve:`2013-0306`
------------------------------------
...
...
@@ -381,8 +381,8 @@ Denial-of-service via formset ``max_num`` bypass. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.3
`(patch) <https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0>`__
* Django 1.3
:commit:`(patch) <d7094bbce8cb838f3b40f504f198c098ff1cf727>`
* Django 1.4
:commit:`(patch) <0cc350a896f70ace18280410eb616a9197d862b0>`
August 13, 2013 - :cve:`2013-4249`
----------------------------------
...
...
@@ -393,7 +393,7 @@ XSS via admin trusting ``URLField`` values. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.5
`(patch) <https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78>`__
* Django 1.5
:commit:`(patch) <90363e388c61874add3f3557ee654a996ec75d78>`
August 13, 2013 - :cve:`2013-6044`
----------------------------------
...
...
@@ -404,8 +404,8 @@ Possible XSS via unvalidated URL redirect schemes. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`__
* Django 1.4
:commit:`(patch) <ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`
* Django 1.5
:commit:`(patch) <1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`
September 10, 2013 - :cve:`2013-4315`
-------------------------------------
...
...
@@ -416,8 +416,8 @@ Directory-traversal via ``ssi`` template tag. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/87d2750b39f6f2d54b7047225521a44dcd37e896>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`__
* Django 1.4
:commit:`(patch) <87d2750b39f6f2d54b7047225521a44dcd37e896>`
* Django 1.5
:commit:`(patch) <988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`
September 14, 2013 - :cve:`2013-1443`
-------------------------------------
...
...
@@ -428,8 +428,8 @@ Denial-of-service via large passwords. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch <https://github.com/django/django/commit/3f3d887a6844ec2db743fee64c9e53e04d39a368>`__ and `Python compatibility fix) <https://github.com/django/django/commit/6903d1690a92aa040adfb0c8eb37cf62e4206714>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`__
* Django 1.4
:commit:`(patch <3f3d887a6844ec2db743fee64c9e53e04d39a368>` and :commit:`Python compatibility fix) <6903d1690a92aa040adfb0c8eb37cf62e4206714>`
* Django 1.5
:commit:`(patch) <22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`
April 21, 2014 - :cve:`2014-0472`
---------------------------------
...
...
@@ -440,10 +440,10 @@ Unexpected code execution using ``reverse()``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/4352a50871e239ebcdf64eee6f0b88e714015c1b>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/546740544d7f69254a67b06a3fc7fa0c43512958>`__
* Django 1.4
:commit:`(patch) <c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`
* Django 1.5
:commit:`(patch) <2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`
* Django 1.6
:commit:`(patch) <4352a50871e239ebcdf64eee6f0b88e714015c1b>`
* Django 1.7
:commit:`(patch) <546740544d7f69254a67b06a3fc7fa0c43512958>`
April 21, 2014 - :cve:`2014-0473`
---------------------------------
...
...
@@ -454,10 +454,10 @@ Caching of anonymous pages could reveal CSRF token. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/1170f285ddd6a94a65f911a27788ba49ca08c0b0>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/d63e20942f3024f24cb8cd85a49461ba8a9b6736>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/380545bf85cbf17fc698d136815b7691f8d023ca>`__
* Django 1.4
:commit:`(patch) <1170f285ddd6a94a65f911a27788ba49ca08c0b0>`
* Django 1.5
:commit:`(patch) <6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`
* Django 1.6
:commit:`(patch) <d63e20942f3024f24cb8cd85a49461ba8a9b6736>`
* Django 1.7
:commit:`(patch) <380545bf85cbf17fc698d136815b7691f8d023ca>`
April 21, 2014 - :cve:`2014-0474`
---------------------------------
...
...
@@ -468,10 +468,10 @@ MySQL typecasting causes unexpected query results. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/aa80f498de6d687e613860933ac58433ab71ea4b>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/34526c2f56b863c2103655a0893ac801667e86ea>`__
* Django 1.4
:commit:`(patch) <aa80f498de6d687e613860933ac58433ab71ea4b>`
* Django 1.5
:commit:`(patch) <985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`
* Django 1.6
:commit:`(patch) <5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`
* Django 1.7
:commit:`(patch) <34526c2f56b863c2103655a0893ac801667e86ea>`
May 18, 2014 - :cve:`2014-1418`
-------------------------------
...
...
@@ -482,10 +482,10 @@ Caches may be allowed to store and serve private data. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/28e23306aa53bbbb8fb87db85f99d970b051026c>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/4001ec8698f577b973c5a540801d8a0bbea1205b>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/1abcf3a808b35abae5d425ed4d44cb6e886dc769>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/7fef18ba9e5a8b47bc24b5bb259c8bf3d3879f2a>`__
* Django 1.4
:commit:`(patch) <28e23306aa53bbbb8fb87db85f99d970b051026c>`
* Django 1.5
:commit:`(patch) <4001ec8698f577b973c5a540801d8a0bbea1205b>`
* Django 1.6
:commit:`(patch) <1abcf3a808b35abae5d425ed4d44cb6e886dc769>`
* Django 1.7
:commit:`(patch) <7fef18ba9e5a8b47bc24b5bb259c8bf3d3879f2a>`
May 18, 2014 - :cve:`2014-3730`
-------------------------------
...
...
@@ -496,10 +496,10 @@ Malformed URLs from user input incorrectly validated. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/7feb54bbae3f637ab3c4dd4831d4385964f574df>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/ad32c218850ad40972dcef57beb460f8c979dd6d>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/601107524523bca02376a0ddc1a06c6fdb8f22f3>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/e7b0cace455c2da24492660636bfd48c45a19cdf>`__
* Django 1.4
:commit:`(patch) <7feb54bbae3f637ab3c4dd4831d4385964f574df>`
* Django 1.5
:commit:`(patch) <ad32c218850ad40972dcef57beb460f8c979dd6d>`
* Django 1.6
:commit:`(patch) <601107524523bca02376a0ddc1a06c6fdb8f22f3>`
* Django 1.7
:commit:`(patch) <e7b0cace455c2da24492660636bfd48c45a19cdf>`
August 20, 2014 - :cve:`2014-0480`
----------------------------------
...
...
@@ -510,10 +510,10 @@ August 20, 2014 - :cve:`2014-0480`
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/c2fe73133b62a1d9e8f7a6b43966570b14618d7e>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/45ac9d4fb087d21902469fc22643f5201d41a0cd>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/da051da8df5e69944745072611351d4cfc6435d5>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/bf650a2ee78c6d1f4544a875dcc777cf27fe93e9>`__
* Django 1.4
:commit:`(patch) <c2fe73133b62a1d9e8f7a6b43966570b14618d7e>`
* Django 1.5
:commit:`(patch) <45ac9d4fb087d21902469fc22643f5201d41a0cd>`
* Django 1.6
:commit:`(patch) <da051da8df5e69944745072611351d4cfc6435d5>`
* Django 1.7
:commit:`(patch) <bf650a2ee78c6d1f4544a875dcc777cf27fe93e9>`
August 20, 2014 - :cve:`2014-0481`
----------------------------------
...
...
@@ -524,10 +524,10 @@ File upload denial of service. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/3123f8452cf49071be9110e277eea60ba0032216>`__
* Django 1.4
:commit:`(patch) <30042d475bf084c6723c6217a21598d9247a9c41>`
* Django 1.5
:commit:`(patch) <26cd48e166ac4d84317c8ee6d63ac52a87e8da99>`
* Django 1.6
:commit:`(patch) <dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1>`
* Django 1.7
:commit:`(patch) <3123f8452cf49071be9110e277eea60ba0032216>`
August 20, 2014 - :cve:`2014-0482`
----------------------------------
...
...
@@ -538,10 +538,10 @@ August 20, 2014 - :cve:`2014-0482`
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/c9e3b9949cd55f090591fbdc4a114fcb8368b6d9>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/dd68f319b365f6cb38c5a6c106faf4f6142d7d88>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/1a45d059c70385fcd6f4a3955f3b4e4cc96d0150>`__
* Django 1.4
:commit:`(patch) <c9e3b9949cd55f090591fbdc4a114fcb8368b6d9>`
* Django 1.5
:commit:`(patch) <dd68f319b365f6cb38c5a6c106faf4f6142d7d88>`
* Django 1.6
:commit:`(patch) <0268b855f9eab3377f2821164ef3e66037789e09>`
* Django 1.7
:commit:`(patch) <1a45d059c70385fcd6f4a3955f3b4e4cc96d0150>`
August 20, 2014 - :cve:`2014-0483`
----------------------------------
...
...
@@ -552,10 +552,10 @@ Data leakage via querystring manipulation in admin.
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0>`__
* Django 1.5
`(patch) <https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6>`__
* Django 1.4
:commit:`(patch) <027bd348642007617518379f8b02546abacaa6e0>`
* Django 1.5
:commit:`(patch) <2a446c896e7c814661fb9c4f212b071b2a7fa446>`
* Django 1.6
:commit:`(patch) <f7c494f2506250b8cb5923714360a3642ed63e0f>`
* Django 1.7
:commit:`(patch) <2b31342cdf14fc20e07c43d258f1e7334ad664a6>`
January 13, 2015 - :cve:`2015-0219`
-----------------------------------
...
...
@@ -566,9 +566,9 @@ WSGI header spoofing via underscore/dash conflation. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`__
* Django 1.4
:commit:`(patch) <4f6fffc1dc429f1ad428ecf8e6620739e8837450>`
* Django 1.6
:commit:`(patch) <d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`
* Django 1.7
:commit:`(patch) <41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`
January 13, 2015 - :cve:`2015-0220`
-----------------------------------
...
...
@@ -579,9 +579,9 @@ description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/4c241f1b710da6419d9dca160e80b23b82db7758>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/72e0b033662faa11bb7f516f18a132728aa0ae28>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/de67dedc771ad2edec15c1d00c083a1a084e1e89>`__
* Django 1.4
:commit:`(patch) <4c241f1b710da6419d9dca160e80b23b82db7758>`
* Django 1.6
:commit:`(patch) <72e0b033662faa11bb7f516f18a132728aa0ae28>`
* Django 1.7
:commit:`(patch) <de67dedc771ad2edec15c1d00c083a1a084e1e89>`
January 13, 2015 - :cve:`2015-0221`
-----------------------------------
...
...
@@ -592,9 +592,9 @@ description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a>`__
* Django 1.4
:commit:`(patch) <d020da6646c5142bc092247d218a3d1ce3e993f7>`
* Django 1.6
:commit:`(patch) <553779c4055e8742cc832ed525b9ee34b174934f>`
* Django 1.7
:commit:`(patch) <818e59a3f0fbadf6c447754d202d88df025f8f2a>`
January 13, 2015 - :cve:`2015-0222`
-----------------------------------
...
...
@@ -605,8 +605,8 @@ Database denial-of-service with ``ModelMultipleChoiceField``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.6
`(patch) <https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392>`__
* Django 1.6
:commit:`(patch) <d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`
* Django 1.7
:commit:`(patch) <bcfb47780ce7caecb409a9e9c1c314266e41d392>`
March 9, 2015 - :cve:`2015-2241`
--------------------------------
...
...
@@ -617,8 +617,8 @@ XSS attack via properties in ``ModelAdmin.readonly_fields``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.7
`(patch) <https://github.com/django/django/commit/d16e4e1d6f95e6f46bff53cc4fd0ab398b8e5059>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/2654e1b93923bac55f12b4e66c5e39b16695ace5>`_
* Django 1.7
:commit:`(patch) <d16e4e1d6f95e6f46bff53cc4fd0ab398b8e5059>`
* Django 1.8
:commit:`(patch) <2654e1b93923bac55f12b4e66c5e39b16695ace5>`
March 18, 2015 - :cve:`2015-2316`
---------------------------------
...
...
@@ -629,9 +629,9 @@ Denial-of-service possibility with ``strip_tags()``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.6
`(patch) <https://github.com/django/django/commit/b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/e63363f8e075fa8d66326ad6a1cc3391cc95cd97>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/5447709a571cd5d95971f1d5d21d4a7edcf85bbd>`__
* Django 1.6
:commit:`(patch) <b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f>`
* Django 1.7
:commit:`(patch) <e63363f8e075fa8d66326ad6a1cc3391cc95cd97>`
* Django 1.8
:commit:`(patch) <5447709a571cd5d95971f1d5d21d4a7edcf85bbd>`
March 18, 2015 - :cve:`2015-2317`
---------------------------------
...
...
@@ -642,10 +642,10 @@ description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.4
`(patch) <https://github.com/django/django/commit/2342693b31f740a422abf7267c53b4e7bc487c1b>`__
* Django 1.6
`(patch) <https://github.com/django/django/commit/5510f070711540aaa8d3707776cd77494e688ef9>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/2a4113dbd532ce952308992633d802dc169a75f1>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/770427c2896a078925abfca2317486b284d22f04>`__
* Django 1.4
:commit:`(patch) <2342693b31f740a422abf7267c53b4e7bc487c1b>`
* Django 1.6
:commit:`(patch) <5510f070711540aaa8d3707776cd77494e688ef9>`
* Django 1.7
:commit:`(patch) <2a4113dbd532ce952308992633d802dc169a75f1>`
* Django 1.8
:commit:`(patch) <770427c2896a078925abfca2317486b284d22f04>`
May 20, 2015 - :cve:`2015-3982`
-------------------------------
...
...
@@ -656,7 +656,7 @@ Fixed session flushing in the cached_db backend. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/31cb25adecba930bdeee4556709f5a1c42d88fd6>`__
* Django 1.8
:commit:`(patch) <31cb25adecba930bdeee4556709f5a1c42d88fd6>`
July 8, 2015 - :cve:`2015-5143`
-------------------------------
...
...
@@ -667,9 +667,9 @@ description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/66d12d1ababa8f062857ee5eb43276493720bf16>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/1828f4341ec53a8684112d24031b767eba557663>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/2e47f3e401c29bc2ba5ab794d483cb0820855fb9>`__
* Django 1.8
:commit:`(patch) <66d12d1ababa8f062857ee5eb43276493720bf16>`
* Django 1.7
:commit:`(patch) <1828f4341ec53a8684112d24031b767eba557663>`
* Django 1.4
:commit:`(patch) <2e47f3e401c29bc2ba5ab794d483cb0820855fb9>`
July 8, 2015 - :cve:`2015-5144`
-------------------------------
...
...
@@ -680,9 +680,9 @@ description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/574dd5e0b0fbb877ae5827b1603d298edc9bb2a0>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/ae49b4d994656bc037513dcd064cb9ce5bb85649>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/1ba1cdce7d58e6740fe51955d945b56ae51d072a>`__
* Django 1.8
:commit:`(patch) <574dd5e0b0fbb877ae5827b1603d298edc9bb2a0>`
* Django 1.7
:commit:`(patch) <ae49b4d994656bc037513dcd064cb9ce5bb85649>`
* Django 1.4
:commit:`(patch) <1ba1cdce7d58e6740fe51955d945b56ae51d072a>`
July 8, 2015 - :cve:`2015-5145`
-------------------------------
...
...
@@ -693,7 +693,7 @@ Denial-of-service possibility in URL validation. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c>`__
* Django 1.8
:commit:`(patch) <8f9a4d3a2bc42f14bb437defd30c7315adbff22c>`
August 18, 2015 - :cve:`2015-5963` / :cve:`2015-5964`
-----------------------------------------------------
...
...
@@ -704,9 +704,9 @@ Denial-of-service possibility in ``logout()`` view by filling session store.
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/2eb86b01d7b59be06076f6179a454d0fd0afaff6>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/2f5485346ee6f84b4e52068c04e043092daf55f7>`__
* Django 1.4
`(patch) <https://github.com/django/django/commit/575f59f9bc7c59a5e41a081d1f5f55fc859c5012>`__
* Django 1.8
:commit:`(patch) <2eb86b01d7b59be06076f6179a454d0fd0afaff6>`
* Django 1.7
:commit:`(patch) <2f5485346ee6f84b4e52068c04e043092daf55f7>`
* Django 1.4
:commit:`(patch) <575f59f9bc7c59a5e41a081d1f5f55fc859c5012>`
November 24, 2015 - :cve:`2015-8213`
------------------------------------
...
...
@@ -717,8 +717,8 @@ Settings leak possibility in ``date`` template filter. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.8
`(patch) <https://github.com/django/django/commit/9f83fc2f66f5a0bac7c291aec55df66050bb6991>`__
* Django 1.7
`(patch) <https://github.com/django/django/commit/8a01c6b53169ee079cb21ac5919fdafcc8c5e172>`__
* Django 1.8
:commit:`(patch) <9f83fc2f66f5a0bac7c291aec55df66050bb6991>`
* Django 1.7
:commit:`(patch) <8a01c6b53169ee079cb21ac5919fdafcc8c5e172>`
February 1, 2016 - :cve:`2016-2048`
-----------------------------------
...
...
@@ -730,7 +730,7 @@ User with "change" but not "add" permission can create objects for
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.9
`(patch) <https://github.com/django/django/commit/adbca5e4db42542575734b8e5d26961c8ada7265>`__
* Django 1.9
:commit:`(patch) <adbca5e4db42542575734b8e5d26961c8ada7265>`
March 1, 2016 - :cve:`2016-2512`
--------------------------------
...
...
@@ -742,8 +742,8 @@ containing basic auth. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.9
`(patch) <https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350>`__
* Django 1.9
:commit:`(patch) <fc6d147a63f89795dbcdecb0559256470fff4380>`
* Django 1.8
:commit:`(patch) <382ab137312961ad62feb8109d70a5a581fe8350>`
March 1, 2016 - :cve:`2016-2513`
--------------------------------
...
...
@@ -755,8 +755,8 @@ upgrade. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.9
`(patch) <https://github.com/django/django/commit/af7d09b0c5c6ab68e629fd9baf736f9dd203b18e>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/f4e6e02f7713a6924d16540be279909ff4091eb6>`__
* Django 1.9
:commit:`(patch) <af7d09b0c5c6ab68e629fd9baf736f9dd203b18e>`
* Django 1.8
:commit:`(patch) <f4e6e02f7713a6924d16540be279909ff4091eb6>`
July 18, 2016 - :cve:`2016-6186`
--------------------------------
...
...
@@ -767,8 +767,8 @@ XSS in admin's add/change related popup. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.9
`(patch) <https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d>`__
* Django 1.9
:commit:`(patch) <d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158>`
* Django 1.8
:commit:`(patch) <f68e5a99164867ab0e071a936470958ed867479d>`
September 26, 2016 - :cve:`2016-7401`
-------------------------------------
...
...
@@ -779,8 +779,8 @@ CSRF protection bypass on a site with Google Analytics. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.9
`(patch) <https://github.com/django/django/commit/d1bc980db1c0fffd6d60677e62f70beadb9fe64a>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/6118ab7d0676f0d622278e5be215f14fb5410b6a>`__
* Django 1.9
:commit:`(patch) <d1bc980db1c0fffd6d60677e62f70beadb9fe64a>`
* Django 1.8
:commit:`(patch) <6118ab7d0676f0d622278e5be215f14fb5410b6a>`
November 1, 2016 - :cve:`2016-9013`
-----------------------------------
...
...
@@ -791,9 +791,9 @@ description <https://www.djangoproject.com/weblog/2016/nov/01/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.10
`(patch) <https://github.com/django/django/commit/34e10720d81b8d407aa14d763b6a7fe8f13b4f2e>`__
* Django 1.9
`(patch) <https://github.com/django/django/commit/4844d86c7728c1a5a3bbce4ad336a8d32304072b>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/70f99952965a430daf69eeb9947079aae535d2d0>`__
* Django 1.10
:commit:`(patch) <34e10720d81b8d407aa14d763b6a7fe8f13b4f2e>`
* Django 1.9
:commit:`(patch) <4844d86c7728c1a5a3bbce4ad336a8d32304072b>`
* Django 1.8
:commit:`(patch) <70f99952965a430daf69eeb9947079aae535d2d0>`
November 1, 2016 - :cve:`2016-9014`
-----------------------------------
...
...
@@ -804,9 +804,9 @@ DNS rebinding vulnerability when ``DEBUG=True``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.10
`(patch) <https://github.com/django/django/commit/884e113838e5a72b4b0ec9e5e87aa480f6aa4472>`__
* Django 1.9
`(patch) <https://github.com/django/django/commit/45acd6d836895a4c36575f48b3fb36a3dae98d19>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/c401ae9a7dfb1a94a8a61927ed541d6f93089587>`__
* Django 1.10
:commit:`(patch) <884e113838e5a72b4b0ec9e5e87aa480f6aa4472>`
* Django 1.9
:commit:`(patch) <45acd6d836895a4c36575f48b3fb36a3dae98d19>`
* Django 1.8
:commit:`(patch) <c401ae9a7dfb1a94a8a61927ed541d6f93089587>`
April 4, 2017 - :cve:`2017-7233`
--------------------------------
...
...
@@ -817,9 +817,9 @@ Open redirect and possible XSS attack via user-supplied numeric redirect URLs.
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.10
`(patch) <https://github.com/django/django/commit/f824655bc2c50b19d2f202d7640785caabc82787>`__
* Django 1.9
`(patch) <https://github.com/django/django/commit/254326cb3682389f55f886804d2c43f7b9f23e4f>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/8339277518c7d8ec280070a780915304654e3b66>`__
* Django 1.10
:commit:`(patch) <f824655bc2c50b19d2f202d7640785caabc82787>`
* Django 1.9
:commit:`(patch) <254326cb3682389f55f886804d2c43f7b9f23e4f>`
* Django 1.8
:commit:`(patch) <8339277518c7d8ec280070a780915304654e3b66>`
April 4, 2017 - :cve:`2017-7234`
--------------------------------
...
...
@@ -830,9 +830,9 @@ description <https://www.djangoproject.com/weblog/2017/apr/04/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.10
`(patch) <https://github.com/django/django/commit/2a9f6ef71b8e23fd267ee2be1be26dde8ab67037>`__
* Django 1.9
`(patch) <https://github.com/django/django/commit/5f1ffb07afc1e59729ce2b283124116d6c0659e4>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/4a6b945dffe8d10e7cec107d93e6efaebfbded29>`__
* Django 1.10
:commit:`(patch) <2a9f6ef71b8e23fd267ee2be1be26dde8ab67037>`
* Django 1.9
:commit:`(patch) <5f1ffb07afc1e59729ce2b283124116d6c0659e4>`
* Django 1.8
:commit:`(patch) <4a6b945dffe8d10e7cec107d93e6efaebfbded29>`
September 5, 2017 - :cve:`2017-12794`
-------------------------------------
...
...
@@ -843,8 +843,8 @@ description <https://www.djangoproject.com/weblog/2017/sep/05/security-releases/
Versions affected
~~~~~~~~~~~~~~~~~
* Django 1.11
`(patch) <https://github.com/django/django/commit/e35a0c56086924f331e9422daa266e907a4784cc>`__
* Django 1.10
`(patch) <https://github.com/django/django/commit/58e08e80e362db79eb0fd775dc81faad90dca47a>`__
* Django 1.11
:commit:`(patch) <e35a0c56086924f331e9422daa266e907a4784cc>`
* Django 1.10
:commit:`(patch) <58e08e80e362db79eb0fd775dc81faad90dca47a>`
February 1, 2018 - :cve:`2018-6188`
-----------------------------------
...
...
@@ -855,8 +855,8 @@ Information leakage in ``AuthenticationForm``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.0
`(patch) <https://github.com/django/django/commit/c37bb28677295f6edda61d8ac461014ef0d3aeb2>`__
* Django 1.11
`(patch) <https://github.com/django/django/commit/57b95fedad5e0b83fc9c81466b7d1751c6427aae>`__
* Django 2.0
:commit:`(patch) <c37bb28677295f6edda61d8ac461014ef0d3aeb2>`
* Django 1.11
:commit:`(patch) <57b95fedad5e0b83fc9c81466b7d1751c6427aae>`
March 6, 2018 - :cve:`2018-7536`
--------------------------------
...
...
@@ -868,9 +868,9 @@ filters. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.0
`(patch) <https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8>`__
* Django 1.11
`(patch) <https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2>`__
* Django 2.0
:commit:`(patch) <e157315da3ae7005fa0683ffc9751dbeca7306c8>`
* Django 1.11
:commit:`(patch) <abf89d729f210c692a50e0ad3f75fb6bec6fae16>`
* Django 1.8
:commit:`(patch) <1ca63a66ef3163149ad822701273e8a1844192c2>`
March 6, 2018 - :cve:`2018-7537`
--------------------------------
...
...
@@ -882,9 +882,9 @@ Denial-of-service possibility in ``truncatechars_html`` and
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.0
`(patch) <https://github.com/django/django/commit/94c5da1d17a6b0d378866c66b605102c19f7988c>`__
* Django 1.11
`(patch) <https://github.com/django/django/commit/a91436360b79a6ff995c3e5018bcc666dfaf1539>`__
* Django 1.8
`(patch) <https://github.com/django/django/commit/d17974a287a6ea2e361daff88fcc004cbd6835fa>`__
* Django 2.0
:commit:`(patch) <94c5da1d17a6b0d378866c66b605102c19f7988c>`
* Django 1.11
:commit:`(patch) <a91436360b79a6ff995c3e5018bcc666dfaf1539>`
* Django 1.8
:commit:`(patch) <d17974a287a6ea2e361daff88fcc004cbd6835fa>`
August 1, 2018 - :cve:`2018-14574`
----------------------------------
...
...
@@ -895,9 +895,9 @@ Open redirect possibility in ``CommonMiddleware``. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.1
`(patch) <https://github.com/django/django/commit/c4e5ff7fdb5fce447675e90291fd33fddd052b3c>`__
* Django 2.0
`(patch) <https://github.com/django/django/commit/6fffc3c6d420e44f4029d5643f38d00a39b08525>`__
* Django 1.11
`(patch) <https://github.com/django/django/commit/d6eaee092709aad477a9894598496c6deec532ff>`__
* Django 2.1
:commit:`(patch) <c4e5ff7fdb5fce447675e90291fd33fddd052b3c>`
* Django 2.0
:commit:`(patch) <6fffc3c6d420e44f4029d5643f38d00a39b08525>`
* Django 1.11
:commit:`(patch) <d6eaee092709aad477a9894598496c6deec532ff>`
October 1, 2018 - :cve:`2018-16984`
-----------------------------------
...
...
@@ -908,7 +908,7 @@ Password hash disclosure to "view only" admin users. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.1
`(patch) <https://github.com/django/django/commit/c4bd5b597e0aa2432e4c867b86650f18af117851>`__
* Django 2.1
:commit:`(patch) <c4bd5b597e0aa2432e4c867b86650f18af117851>`
January 4, 2019 - :cve:`2019-3498`
----------------------------------
...
...
@@ -919,6 +919,6 @@ Content spoofing possibility in the default 404 page. `Full description
Versions affected
~~~~~~~~~~~~~~~~~
* Django 2.1
`(patch) <https://github.com/django/django/commit/64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b>`__
* Django 2.0
`(patch) <https://github.com/django/django/commit/9f4ed7c94c62e21644ef5115e393ac426b886f2e>`__
* Django 1.11
`(patch) <https://github.com/django/django/commit/1cd00fcf52d089ef0fe03beabd05d59df8ea052a>`__
* Django 2.1
:commit:`(patch) <64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b>`
* Django 2.0
:commit:`(patch) <9f4ed7c94c62e21644ef5115e393ac426b886f2e>`
* Django 1.11
:commit:`(patch) <1cd00fcf52d089ef0fe03beabd05d59df8ea052a>`
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment