Vulnerabilities
Vulnerable Software
Mozilla:  >> Bleach  >> 1.4  Security Vulnerabilities
bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
CVSS Score
7.5
EPSS Score
0.002
Published
2023-02-16
A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: none of the above tags are in the default allowed tags and strip_comments defaults to True.
CVSS Score
6.1
EPSS Score
0.003
Published
2023-02-16
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
CVSS Score
6.1
EPSS Score
0.004
Published
2020-03-24
In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg or math tags are whitelisted and the keyword argument strip=False.
CVSS Score
6.1
EPSS Score
0.004
Published
2020-03-24


Contact Us

Shodan ® - All rights reserved