Количество 11
Количество 11
CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
CVE-2019-19450
paraparser in ReportLab before 3.5.31 allows remote code execution bec ...
SUSE-SU-2023:4048-1
Security update for python-reportlab
SUSE-SU-2023:3972-1
Security update for python-reportlab
GHSA-pj98-2xf6-cff5
ReportLab vulnerable to remote code execution via paraparser
ELSA-2023-5790
ELSA-2023-5790: python-reportlab security update (IMPORTANT)
ELSA-2023-5616
ELSA-2023-5616: python-reportlab security update (IMPORTANT)
BDU:2023-07027
Уязвимость функции start_unichar (paraparser.py) библиотеки ReportLab, позволяющая нарушителю выполнить произвольный код
ROS-20240524-02
Множественные уязвимости python3-reportlab
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626. | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
CVE-2019-19450 paraparser in ReportLab before 3.5.31 allows remote code execution bec ... | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
SUSE-SU-2023:4048-1 Security update for python-reportlab | 4% Низкий | около 2 лет назад | ||
SUSE-SU-2023:3972-1 Security update for python-reportlab | 4% Низкий | около 2 лет назад | ||
GHSA-pj98-2xf6-cff5 ReportLab vulnerable to remote code execution via paraparser | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
ELSA-2023-5790 ELSA-2023-5790: python-reportlab security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5616 ELSA-2023-5616: python-reportlab security update (IMPORTANT) | около 2 лет назад | |||
BDU:2023-07027 Уязвимость функции start_unichar (paraparser.py) библиотеки ReportLab, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 4% Низкий | около 2 лет назад | |
ROS-20240524-02 Множественные уязвимости python3-reportlab | CVSS3: 9.8 | больше 1 года назад |
Уязвимостей на страницу