Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

lxml — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting lxml. AI-powered Chinese analysis, POCs, and references for each vulnerability.

lxml serves as a Python library for processing XML and HTML, widely used for web scraping and data parsing. Historically, it has been susceptible to remote code execution vulnerabilities through crafted XML inputs, often via entity expansion attacks or insecure parsing methods. Cross-site scripting (XSS) has also been reported when processing malformed HTML. The library's C-based components have occasionally introduced memory corruption issues. While lxml has addressed these vulnerabilities through updates, its three CVEs highlight risks when processing untrusted input. Security-conscious implementations should validate and sanitize inputs before parsing to prevent potential exploits.

Found 1 results / 3Clear Filters
Top products by lxml: lxml lxml/lxml
CVE IDTitleCVSSSeverityPublished
CVE-2022-2309 NULL Pointer Dereference in lxml/lxml — lxml/lxmlCWE-476 7.5 -2022-07-05

This page lists every published CVE security advisory associated with lxml. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.