diff --git a/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json b/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json new file mode 100644 index 00000000000..48e60e19822 --- /dev/null +++ b/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2019-19450", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-20T14:15:12.310", + "lastModified": "2023-09-20T14:25:39.550", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '