@@ -36,6 +36,30 @@ Issues under Django's security process
3636All security issues have been handled under versions of Django's security
3737process. These are listed below.
3838
39+ November 5, 2025 - :cve:`2025-64458`
40+ ------------------------------------
41+
42+ Potential denial-of-service vulnerability in ``HttpResponseRedirect`` and
43+ ``HttpResponsePermanentRedirect`` on Windows. `Full description
44+ <https://www.djangoproject.com/weblog/2025/nov/05/security-releases/>`__
45+
46+ * Django 6.0 :commit:`(patch) <6e13348436fccf8f22982921d6a3a3e65c956a9f>`
47+ * Django 5.2 :commit:`(patch) <4f5d904b63751dea9ffc3b0e046404a7fa5881ac>`
48+ * Django 5.1 :commit:`(patch) <3790593781d26168e7306b5b2f8ea0309de16242>`
49+ * Django 4.2 :commit:`(patch) <770eea38d7a0e9ba9455140b5a9a9e33618226a7>`
50+
51+ November 5, 2025 - :cve:`2025-64459`
52+ ------------------------------------
53+
54+ Potential SQL injection via ``_connector`` keyword argument in ``QuerySet`` and
55+ ``Q`` objects. `Full description
56+ <https://www.djangoproject.com/weblog/2025/nov/05/security-releases/>`__
57+
58+ * Django 6.0 :commit:`(patch) <06dd38324ac3d60d83d9f3adabf0dcdf423d2a85>`
59+ * Django 5.2 :commit:`(patch) <6703f364d767e949c5b0e4016433ef75063b4f9b>`
60+ * Django 5.1 :commit:`(patch) <72d2c87431f2ae0431d65d0ec792047f078c8241>`
61+ * Django 4.2 :commit:`(patch) <59ae82e67053d281ff4562a24bbba21299f0a7d4>`
62+
3963October 1, 2025 - :cve:`2025-59681`
4064-----------------------------------
4165
0 commit comments