Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.
"https://github.com/pypa/advisory-database/blob/main/vulns/python-cjson/PYSEC-2010-26.yaml"