lxml@4.1.0 vulnerabilities
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
-
latest version
5.3.0
-
latest non vulnerable version
-
first published
17 years ago
-
latest version published
3 months ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the lxml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to NULL Pointer Dereference in the NOTE: This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. How to fix NULL Pointer Dereference? Upgrade |
[,4.9.1)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The HTML Cleaner in How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.6.5)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via How to fix Cross-site Scripting (XSS)? Upgrade |
[0,4.6.3)
|
Affected versions of this package are vulnerable to Arbitrary File Write. When writing to file paths that contain the URL escape character '%', the file path could wrongly be mangled by URL unescaping and thus write to a different file or directory. How to fix Arbitrary File Write? Upgrade |
[,4.4.0)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The HTML Cleaner allowed JavaScript to pass through. The cleaner now removes more sneaky "style" content. How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.6.2)
|
lxml is a Pythonic, mature binding for the libxml2 and libxslt libraries. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. Due to an improper escaping, an attacker could perform XSS attack in Internet Explorer. How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.2.5)
|