<feed xmlns='http://www.w3.org/2005/Atom'>
<title>django.git/tests/urlpatterns_reverse/nonimported_module.py, branch main</title>
<subtitle>django
</subtitle>
<id>http://cgit.adnoto.dev/django.git/atom?h=main</id>
<link rel='self' href='http://cgit.adnoto.dev/django.git/atom?h=main'/>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/'/>
<updated>2014-04-21T22:11:26Z</updated>
<entry>
<title>Fixed a remote code execution vulnerabilty in URL reversing.</title>
<updated>2014-04-21T22:11:26Z</updated>
<author>
<name>Tim Graham</name>
<email>timograham@gmail.com</email>
</author>
<published>2014-04-20T17:12:43Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=8b93b31487d6d3b0fcbbd0498991ea0db9088054'/>
<id>urn:sha1:8b93b31487d6d3b0fcbbd0498991ea0db9088054</id>
<content type='text'>
Thanks Benjamin Bach for the report and initial patch.

This is a security fix; disclosure to follow shortly.
</content>
</entry>
</feed>
