python-django16 was added to epel7 repo on 2017-12-08
Page updated: 2024-04-20 21:14
Repo Status -
Overall Status
Source NVR: python-django16-1.6.11.7-5.el7 (2018-12-18)
python-django16-bash-completion | python-django16-bash-completion-1.6.11.7-5.el7 |
python2-django16 | python2-django16-1.6.11.7-5.el7 |
1611051 | NEW | CVE-2018-14574 python-django16: django: Open redirect possibility in CommonMiddleware [epel-7] |
1735769 | NEW | CVE-2019-14232 python-django16: Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS [epel-7] |
1735773 | NEW | CVE-2019-14233 python-django16: Django: the behavior of the underlying HTMLParser leading to DoS [epel-7] |
1735782 | NEW | CVE-2019-14235 python-django16: Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri() [epel-7] |
1788428 | NEW | CVE-2019-19844 python-django16: Django: crafted email address allows account takeover [epel-7] |
1810095 | NEW | CVE-2020-9402 python-django16: django: potential SQL injection via "tolerance" parameter in GIS functions and aggregates on Oracle [epel-7] |
1843618 | NEW | CVE-2020-13254 python-django16: django: potential data leakage via malformed memcached keys [epel-7] |
1843629 | NEW | CVE-2020-13596 python-django16: django: possible XSS via admin ForeignKeyRawIdWidget [epel-7] |
1931540 | NEW | CVE-2021-23336 python-django16: python: Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters [epel-all] |
2219379 | NEW | CVE-2023-36053 python-django16: python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator [epel-7] |