Mozilla

Bleach

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Published 16.02.2023 22:15:10
  • Last modified 19.03.2025 16:15:14

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attribute...

Exploit
  • EPSS 0.4%
  • Published 16.02.2023 22:15:10
  • Last modified 19.03.2025 16:15:15

A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: ...

Exploit
  • EPSS 0.29%
  • Published 24.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:12

In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.

Exploit
  • EPSS 0.42%
  • Published 24.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg or math tags are whitelisted and the keyword argument strip=False.

  • EPSS 0.51%
  • Published 07.03.2018 23:29:00
  • Last modified 21.11.2024 04:12:40

An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not...