Search for packages
| purl | pkg:gem/bootstrap-sass@3.2.0.4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-hbwg-ebvx-k7e1
Aliases: CVE-2018-14040 GHSA-3wqf-4x89-9g79 |
Cross-site Scripting In Bootstrap, XSS is possible in the collapse data-parent attribute. |
Affected by 3 other vulnerabilities. |
|
VCID-yzg2-xekr-ykd9
Aliases: CVE-2024-6484 GHSA-9mvj-f7w8-pvh2 |
Withdrawn Advisory: Bootstrap Cross-Site Scripting (XSS) vulnerability ## Withdrawn Advisory This advisory has been withdrawn because it was determined to not be a vulnerability in Bootstrap. From the CVE: > This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded. ## Original Description A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the `data-slide` and `data-slide-to` attributes can be exploited through the href attribute of an `<a>` tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-fweg-dvej-dbfh | Malicious Package An unauthenticated attacker can craft the `___cfduid` cookie value with base64 arbitrary code to be executed via `eval()`, which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the `__cfduid` cookie that is legitimately used by Cloudflare. |
CVE-2019-10842
GHSA-vqqv-v9m2-48p2 |