Search for packages
purl | pkg:gem/bootstrap-sass@3.2.0.4 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 3.1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-d4k9-se4n-4fh9
Aliases: CVE-2024-6484 GHSA-9mvj-f7w8-pvh2 |
Bootstrap Cross-Site Scripting (XSS) vulnerability A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the `data-slide` and `data-slide-to` attributes can be exploited through the href attribute of an `<a>` tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser. | There are no reported fixed by versions. |
VCID-e8jt-6jum-n3az
Aliases: CVE-2018-14040 GHSA-3wqf-4x89-9g79 |
Bootstrap vulnerable to Cross-Site Scripting (XSS) In Bootstrap starting in version 2.3.0 and prior to 3.4.0, as well as 4.x before 4.1.2, XSS is possible in the collapse data-parent attribute. |
Affected by 3 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-2734-b497-nqct | Bootstrap-sass contains code execution backdoor Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare. |
CVE-2019-10842
GHSA-vqqv-v9m2-48p2 |