Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3306-1 | python-django security update |
Debian DSA |
DSA-5465-1 | python-django security update |
EUVD |
EUVD-2023-0066 | In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. |
Github GHSA |
GHSA-q2jf-h9jm-m7p4 | Django contains Uncontrolled Resource Consumption via cached header |
Ubuntu USN |
USN-5837-1 | Django vulnerability |
Ubuntu USN |
USN-5837-2 | Django vulnerability |
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-27T14:17:49.400Z
Reserved: 2023-01-20T00:00:00.000Z
Link: CVE-2023-23969
Updated: 2024-08-02T10:49:08.226Z
Status : Modified
Published: 2023-02-01T19:15:08.763
Modified: 2025-03-27T15:15:45.150
Link: CVE-2023-23969
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN