3 results (0.002 seconds)

CVSS: 10.0EPSS: 7%CPEs: 2EXPL: 0

20 Sep 2023 — paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with 'CVSS: 7.8EPSS: 19%CPEs: 1EXPL: 5

05 Jun 2023 — Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file. Elyas Damej discovered that a sandbox mechanism in ReportLab, a Python library to create PDF documents, could be bypassed which may result in the execution of arbitrary code when converting malformed HTML to a PDF document. • https://github.com/L41KAA/CVE-2023-33733-Exploit-PoC • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 36%CPEs: 1EXPL: 1

16 Oct 2019 — ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '