PyPi: Mpd-Parser

CVE-2022-2309

Transitive

Safety vulnerability ID: 50623

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 05, 2022 Updated at Nov 15, 2024
Scan your Python projects for vulnerabilities →

Advisory

Mpd-parser 0.0.5 updates its dependency 'lxml' to v4.9.1 to include a security fix.

Affected package

mpd-parser

Latest version: 0.1.4

lxml based parser for DASH manifests (mpd files)

Affected versions

Fixed versions

Vulnerability changelog

Minor fixes and additions, trying to upload the build files from github directly.

What's Changed
* Fixing file locations and pylint errors by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/1
* Fixing file locations and pylint errors by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/2
* Fixing file locations and pylint errors by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/3
* Updated the information in the readme file by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/4
* Update readme by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/5
* Bug/empty float value by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/6
* Fix the security vuln and add pytest action by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/7
* fixed issue when manifest had no encoding declared by avishaycohen in https://github.com/avishaycohen/mpd-parser/pull/8

New Contributors
* avishaycohen made their first contribution in https://github.com/avishaycohen/mpd-parser/pull/1

**Full Changelog**: https://github.com/avishaycohen/mpd-parser/commits/v0.0.5

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Impact (A)
PARTIAL