Safety vulnerability ID: 50747
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Lxml 4.2.5 includes a fix for CVE-2018-19787: lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
Latest version: 5.3.0
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application