PyPi: Lxml

PVE-2021-39195

Safety vulnerability ID: 39195

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 14, 2021 Updated at Aug 10, 2024

Advisory

In lxml before 4.4.0, when writing to file paths that contain the URL escape character '%…

[This advisory has been limited. Please create a free account to view the full advisory.]

Affected package

lxml

Latest version: 5.3.0

Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.

Affected versions

Fixed versions

Vulnerability changelog

================== Features added -------------- * ``Element.clear()`` accepts a new ke…

[This text has been limited. Please create a free account to view the full text.]

Resources

Severity Details

Create a free account to access detailed CVSS severity scores and full vulnerability advisories

Create free account

CVSS Base Score

HIDDEN X.Y

CVSS v3 Details

Base severity XY
Attack Vector (AV)
XYZ
Attack Complexity (AC)
XYZ
Privileges Required (PR)
XYZ
User Interaction (UI)
XYZ
Scope (S)
XYZ
Confidentiality Impact (C)
XYZ
Integrity Impact (I)
XYZ
Availability Availability (A)
XYZ