Количество 5
Количество 5
CVE-2020-6817
bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
CVE-2020-6817
bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
CVE-2020-6817
bleach.clean behavior parsing style attributes could result in a regul ...
GHSA-vqhp-cxgc-6wmm
regular expression denial-of-service (ReDoS) in Bleach
openSUSE-SU-2021:0552-1
Security update for python-bleach
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-6817 bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}). | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
CVE-2020-6817 bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}). | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
CVE-2020-6817 bleach.clean behavior parsing style attributes could result in a regul ... | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
GHSA-vqhp-cxgc-6wmm regular expression denial-of-service (ReDoS) in Bleach | CVSS3: 7.5 | 0% Низкий | почти 6 лет назад | |
openSUSE-SU-2021:0552-1 Security update for python-bleach | почти 5 лет назад |
Уязвимостей на страницу