Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
django Vendor: djangoproject

About This Product

django is a software product offered by djangoproject. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 136 known vulnerabilities affecting djangoproject django. This includes 11 critical-severity issues and 45 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2026, indicating a sustained research interest and ongoing security attention. 76 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-3695 2009-10-13 2025-04-09 - 5.0 Likely
CVE-2010-3082 2010-09-14 2025-04-11 - 4.3 Likely
CVE-2010-4534 2011-01-10 2025-04-11 - 4.0 Likely
CVE-2010-4535 2011-01-10 2025-04-11 - 5.0 Likely
CVE-2011-0696 2011-02-14 2025-04-11 - 6.8 Likely
CVE-2011-0697 2011-02-14 2025-04-11 - 4.3 Likely
CVE-2011-0698 2011-02-14 2025-04-11 - 7.5 Likely
CVE-2011-4136 2011-10-19 2025-04-11 - 5.8 Likely
CVE-2011-4137 2011-10-19 2025-04-11 - 5.0 Likely
CVE-2011-4138 2011-10-19 2025-04-11 - 5.0 Likely
CVE-2011-4139 2011-10-19 2025-04-11 - 5.0 Likely
CVE-2011-4140 2011-10-19 2025-04-11 - 6.8 Likely
CVE-2012-3442 2012-07-31 2025-04-11 - 4.3 Likely
CVE-2012-3443 2012-07-31 2025-04-11 - 5.0 Likely
CVE-2012-3444 2012-07-31 2025-04-11 - 5.0 Likely
CVE-2012-4520 2012-11-18 2025-04-11 - 6.4 Likely
CVE-2013-0305 2013-05-02 2025-04-11 - 4.0 Likely
CVE-2013-0306 2013-05-02 2025-04-11 - 5.0 Likely
CVE-2013-4315 2013-09-16 2025-04-11 - 5.0 Likely
CVE-2013-1443 2013-09-23 2025-04-11 - 5.0 Likely
CVE-2013-4249 2013-10-04 2025-04-11 - 4.3 Likely
CVE-2013-6044 2013-10-04 2025-04-11 - 4.3 Likely
CVE-2014-0472 2014-04-23 2025-04-12 - 5.1 Unknown
CVE-2014-0473 2014-04-23 2025-04-12 - 5.0 Likely
CVE-2014-0474 2014-04-23 2025-04-12 - 10.0 Likely
CVE-2014-1418 2014-05-16 2025-04-12 - 6.4 Likely
CVE-2014-3730 2014-05-16 2025-04-12 - 4.3 Likely
CVE-2014-0480 2014-08-26 2025-04-12 - 5.8 Likely
CVE-2014-0481 2014-08-26 2025-04-12 - 4.3 Likely
CVE-2014-0482 2014-08-26 2025-04-12 - 6.0 Unknown
CVE-2014-0483 2014-08-26 2025-04-12 - 3.5 Unknown
CVE-2015-0219 2015-01-16 2025-04-12 - 5.0 Likely
CVE-2015-0220 2015-01-16 2025-04-12 - 4.3 Likely
CVE-2015-0221 2015-01-16 2025-04-12 - 5.0 Likely
CVE-2015-0222 2015-01-16 2025-04-12 - 5.0 Likely
CVE-2015-2241 2015-03-12 2025-04-12 - 4.3 Likely
CVE-2015-2316 2015-03-25 2025-04-12 - 5.0 Likely
CVE-2015-2317 2015-03-25 2025-04-12 - 4.3 Likely
CVE-2015-3982 2015-06-02 2025-04-12 - 5.0 Likely
CVE-2015-5143 2015-07-14 2025-04-12 - 7.8 Likely
CVE-2015-5144 2015-07-14 2025-04-12 - 4.3 Likely
CVE-2015-5145 2015-07-14 2025-04-12 - 7.8 Likely
CVE-2015-5963 2015-08-24 2025-04-12 - 5.0 Likely
CVE-2015-5964 2015-08-24 2025-04-12 - 5.0 Likely
CVE-2015-8213 2015-12-07 2025-04-12 - 5.0 Likely
CVE-2016-2048 2016-02-08 2025-04-12 5.5 6.0 Unknown
CVE-2016-2512 2016-04-08 2025-04-12 7.4 4.3 Likely
CVE-2016-2513 2016-04-08 2025-04-12 3.1 2.6 Unknown
CVE-2016-6186 2016-08-05 2025-04-12 6.1 4.3 Likely
CVE-2016-7401 2016-10-03 2025-04-12 7.5 5.0 Likely
CVE-2016-9013 2016-12-09 2025-04-12 9.8 7.5 Likely
CVE-2016-9014 2016-12-09 2025-04-12 8.1 6.8 Likely
CVE-2017-7233 2017-04-04 2025-04-20 6.1 5.8 Likely
CVE-2017-7234 2017-04-04 2025-04-20 6.1 5.8 Likely
CVE-2017-12794 2017-09-07 2025-04-20 6.1 4.3 Likely
CVE-2018-6188 2018-02-05 2024-11-21 7.5 5.0 Likely
CVE-2018-7536 2018-03-09 2024-11-21 5.3 5.0 Likely
CVE-2018-7537 2018-03-09 2024-11-21 5.3 5.0 Likely
CVE-2018-14574 2018-08-03 2024-11-21 6.1 5.8 Likely
CVE-2018-16984 2018-10-02 2024-11-21 4.9 4.0 Likely
CVE-2019-3498 2019-01-09 2024-11-21 6.5 4.3 Likely
CVE-2019-6975 2019-02-11 2024-11-21 7.5 5.0 Likely
CVE-2019-12308 2019-06-03 2024-11-21 6.1 4.3 Likely
CVE-2019-12781 2019-07-01 2024-11-21 5.3 5.0 Likely
CVE-2019-14232 2019-08-02 2024-11-21 7.5 5.0 Likely
CVE-2019-14233 2019-08-02 2024-11-21 7.5 5.0 Likely
CVE-2019-14235 2019-08-02 2024-11-21 7.5 5.0 Likely
CVE-2019-14234 2019-08-09 2024-11-21 9.8 7.5 Likely
CVE-2019-19118 2019-12-02 2024-11-21 6.5 4.0 Likely
CVE-2019-19844 2019-12-18 2024-11-21 9.8 5.0 Likely
CVE-2020-7471 2020-02-03 2024-11-21 9.8 7.5 Likely
CVE-2020-9402 2020-03-05 2024-11-21 8.8 6.5 Likely
CVE-2020-13254 2020-06-03 2024-11-21 5.9 4.3 Likely
CVE-2020-13596 2020-06-03 2024-11-21 6.1 4.3 Likely
CVE-2020-24583 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2020-24584 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2021-3281 2021-02-02 2024-11-21 5.3 5.0 Likely
CVE-2021-23336 2021-02-15 2025-12-17 5.9 4.0 Unknown
CVE-2021-28658 2021-04-06 2024-11-21 5.3 5.0 Likely
CVE-2021-31542 2021-05-05 2024-11-21 7.5 5.0 Likely
CVE-2021-32052 2021-05-06 2024-11-21 6.1 4.3 Likely
CVE-2021-33203 2021-06-08 2024-11-21 4.9 4.0 Likely
CVE-2021-33571 2021-06-08 2024-11-21 7.5 5.0 Likely
CVE-2021-35042 2021-07-02 2024-11-21 9.8 7.5 Likely
CVE-2021-44420 2021-12-08 2024-11-21 7.3 7.5 Likely
CVE-2021-45115 2022-01-05 2024-11-21 7.5 5.0 Likely
CVE-2021-45116 2022-01-05 2025-05-22 7.5 5.0 Likely
CVE-2021-45452 2022-01-05 2024-11-21 5.3 5.0 Likely
CVE-2022-22818 2022-02-03 2024-11-21 6.1 4.3 Likely
CVE-2022-23833 2022-02-03 2024-11-21 7.5 5.0 Likely
CVE-2022-28346 2022-04-12 2024-11-21 9.8 7.5 Likely
CVE-2022-28347 2022-04-12 2024-11-21 9.8 7.5 Likely
CVE-2022-34265 2022-07-04 2024-11-21 9.8 7.5 Likely
CVE-2022-36359 2022-08-03 2024-11-21 8.8 - -
CVE-2022-41323 2022-10-16 2025-05-14 7.5 - -
CVE-2023-23969 2023-02-01 2025-03-27 7.5 - -
CVE-2023-24580 2023-02-15 2025-03-18 7.5 - -
CVE-2023-31047 2023-05-07 2025-01-29 9.8 - -
CVE-2023-36053 2023-07-03 2025-11-04 7.5 - -
CVE-2023-46695 2023-11-02 2024-11-21 7.5 - -
CVE-2023-41164 2023-11-03 2025-11-04 7.5 - -
CVE-2023-43665 2023-11-03 2025-11-04 7.5 - -
CVE-2024-24680 2024-02-06 2025-11-04 7.5 - -
CVE-2024-27351 2024-03-15 2025-11-04 5.3 - -
CVE-2024-38875 2024-07-10 2025-11-04 7.5 - -
CVE-2024-39329 2024-07-10 2025-11-04 5.3 - -
CVE-2024-39330 2024-07-10 2025-11-04 4.3 - -
CVE-2024-39614 2024-07-10 2025-11-04 7.5 - -
CVE-2024-41989 2024-08-07 2025-11-04 7.5 - -
CVE-2024-41990 2024-08-07 2025-11-04 7.5 - -
CVE-2024-41991 2024-08-07 2025-11-04 7.5 - -
CVE-2024-42005 2024-08-07 2025-11-04 7.3 - -
CVE-2024-45230 2024-10-08 2025-03-17 7.5 - -
CVE-2024-45231 2024-10-08 2025-03-17 5.3 - -
CVE-2024-53907 2024-12-06 2025-06-24 7.5 - -
CVE-2024-53908 2024-12-06 2025-06-09 9.8 - -
CVE-2024-56374 2025-01-14 2025-10-03 5.8 - -
CVE-2025-26699 2025-03-06 2025-10-03 5.0 - -
CVE-2025-27556 2025-04-02 2025-10-03 5.8 - -
CVE-2025-32873 2025-05-08 2025-09-02 5.3 - -
CVE-2025-48432 2025-06-05 2025-10-15 4.0 - -
CVE-2025-57833 2025-09-03 2025-11-04 7.1 - -
CVE-2025-59681 2025-10-01 2025-11-04 7.1 - -
CVE-2025-59682 2025-10-01 2025-11-04 3.1 - -
CVE-2025-64458 2025-11-05 2025-11-10 7.5 - -
CVE-2025-64459 2025-11-05 2025-11-10 9.1 - -
CVE-2025-13372 2025-12-02 2025-12-12 4.3 - -
CVE-2025-64460 2025-12-02 2025-12-10 7.5 - -
CVE-2025-13473 2026-02-03 2026-02-04 5.3 - -
CVE-2025-14550 2026-02-03 2026-02-04 7.5 - -
CVE-2026-1207 2026-02-03 2026-02-04 5.4 - -
CVE-2026-1285 2026-02-03 2026-02-04 7.5 - -
CVE-2026-1287 2026-02-03 2026-02-04 5.4 - -
CVE-2026-1312 2026-02-03 2026-02-04 5.4 - -
CVE-2026-25673 2026-03-03 2026-03-05 7.5 - -
CVE-2026-25674 2026-03-03 2026-03-05 3.7 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for djangoproject django by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.