python-django is vulnerable to cross-site scripting. The {% debug %}
template tag in the library does not properly encode the current context, allowing an attacker to inject and execute malicious javascript.
docs.djangoproject.com/en/4.0/releases/security/
github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5
github.com/django/django/commit/1a1e8278c46418bde24c86a65443b0674bae65e2
github.com/django/django/commit/394517f07886495efcf79f95c7ee402a9437bd68
github.com/django/django/commit/c27a7eb9f40b64990398978152e62b6ff839c2e6
groups.google.com/forum/#!forum/django-announce
lists.fedoraproject.org/archives/list/[email protected]/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
security-tracker.debian.org/tracker/CVE-2022-22818
security.netapp.com/advisory/ntap-20220221-0003/
www.debian.org/security/2022/dsa-5254
www.djangoproject.com/weblog/2022/feb/01/security-releases/