Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2023-47113

Disclosure Date: November 08, 2023 (last updated November 16, 2023)
BleachBit cleans files to free disk space and to maintain privacy. BleachBit for Windows up to version 4.4.2 is vulnerable to a DLL Hijacking vulnerability. By placing a DLL in the Folder c:\DLLs, an attacker can run arbitrary code on every execution of BleachBit for Windows. This issue has been patched in version 4.5.0.
Attacker Value
Unknown

CVE-2021-23980

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: none of the above tags are in the default allowed tags and strip_comments defaults to True.
Attacker Value
Unknown

CVE-2020-6817

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
Attacker Value
Unknown

CVE-2020-6816

Disclosure Date: March 24, 2020 (last updated February 21, 2025)
In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg or math tags are whitelisted and the keyword argument strip=False.
Attacker Value
Unknown

CVE-2020-6802

Disclosure Date: March 24, 2020 (last updated February 21, 2025)
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
Attacker Value
Unknown

CVE-2018-7753

Disclosure Date: March 07, 2018 (last updated November 26, 2024)
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
0