Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Bleach
(Mozilla)Repositories | https://github.com/mozilla/bleach |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-03-24 | CVE-2020-6802 | In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option. | Fedora, Bleach | 6.1 | ||
2020-03-24 | CVE-2020-6816 | In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg or math tags are whitelisted and the keyword argument strip=False. | Fedora, Bleach | 6.1 | ||
2023-02-16 | CVE-2020-6817 | bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}). | Bleach | 7.5 | ||
2023-02-16 | CVE-2021-23980 | A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: none of the above tags are in the default allowed tags and strip_comments defaults to True. | Bleach | 6.1 | ||
2018-03-07 | CVE-2018-7753 | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | Bleach | 9.8 |