Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6de580bb by Salvatore Bonaccorso at 2020-03-08T08:59:06+01:00
Update information on CVE-2019-15486/django-js-reverse

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -34957,10 +34957,9 @@ CVE-2019-15488 (Ignite Realtime Openfire before 4.4.1 
has reflected XSS via an L
 CVE-2019-15487 (DfE School Experience before v16333-GA has XSS via a teacher 
training  ...)
        NOT-FOR-US: DfE School Experience
 CVE-2019-15486 (django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS 
via js_ ...)
-       - django-js-reverse <unfixed>
+       - django-js-reverse <not-affected> (Issue introduced in 0.9.0)
        NOTE: https://github.com/ierror/django-js-reverse/pull/81
-       NOTE: 
https://github.com/ierror/django-js-reverse/commit/a3b57d1e4424e2fadabcd526d170c4868d55159c
-       TODO: check, might actually only have been introduced in upstream 
v0.9.0 with commits around 9850b675e3d988341c05302df236a560f7985184
+       NOTE: 
https://github.com/ierror/django-js-reverse/commit/a3b57d1e4424e2fadabcd526d170c4868d55159c
 (0.9.1)
 CVE-2019-15485 (Bolt before 3.6.10 has XSS via createFolder or createFile in 
Controlle ...)
        NOT-FOR-US: Bolt CMS
 CVE-2019-15484 (Bolt before 3.6.10 has XSS via an image's alt or title field. 
...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6de580bb73d1d502dbaeff45ad4943e4744ad3c8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6de580bb73d1d502dbaeff45ad4943e4744ad3c8
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to