Количество 11
Количество 11
GHSA-pj98-2xf6-cff5
ReportLab vulnerable to remote code execution via paraparser

CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution bec ...

SUSE-SU-2023:4048-1
Security update for python-reportlab

SUSE-SU-2023:3972-1
Security update for python-reportlab
ELSA-2023-5790
ELSA-2023-5790: python-reportlab security update (IMPORTANT)
ELSA-2023-5616
ELSA-2023-5616: python-reportlab security update (IMPORTANT)

BDU:2023-07027
Уязвимость функции start_unichar (paraparser.py) библиотеки ReportLab, позволяющая нарушителю выполнить произвольный код

ROS-20240524-02
Множественные уязвимости python3-reportlab
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-pj98-2xf6-cff5 ReportLab vulnerable to remote code execution via paraparser | CVSS3: 9.8 | 9% Низкий | почти 2 года назад | |
![]() | CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 9% Низкий | почти 2 года назад |
![]() | CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 9% Низкий | почти 2 года назад |
![]() | CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 9% Низкий | почти 2 года назад |
CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution bec ... | CVSS3: 9.8 | 9% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4048-1 Security update for python-reportlab | 9% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3972-1 Security update for python-reportlab | 9% Низкий | почти 2 года назад | |
ELSA-2023-5790 ELSA-2023-5790: python-reportlab security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-5616 ELSA-2023-5616: python-reportlab security update (IMPORTANT) | почти 2 года назад | |||
![]() | BDU:2023-07027 Уязвимость функции start_unichar (paraparser.py) библиотеки ReportLab, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 9% Низкий | почти 2 года назад |
![]() | ROS-20240524-02 Множественные уязвимости python3-reportlab | CVSS3: 9.8 | больше 1 года назад |
Уязвимостей на страницу