Search for vulnerabilities
Vulnerability ID | VCID-87kn-rfhf-nbat |
Aliases |
CVE-2024-6485
GHSA-vxmc-5x29-h64v |
Summary | Bootstrap Cross-Site Scripting (XSS) vulnerability for data-* attributes A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 6.2 |
Risk | 3.1 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3 | 6.4 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6485.json |
epss | 0.0005 | https://api.first.org/data/v1/epss?cve=CVE-2024-6485 |
epss | 0.0005 | https://api.first.org/data/v1/epss?cve=CVE-2024-6485 |
cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-vxmc-5x29-h64v |
cvssv3.1 | 6.4 | https://github.com/twbs/bootstrap |
generic_textual | MODERATE | https://github.com/twbs/bootstrap |
cvssv3.1 | 6.4 | https://nvd.nist.gov/vuln/detail/CVE-2024-6485 |
generic_textual | MODERATE | https://nvd.nist.gov/vuln/detail/CVE-2024-6485 |
cvssv3.1 | 6.4 | https://www.herodevs.com/vulnerability-directory/cve-2024-6485 |
generic_textual | MODERATE | https://www.herodevs.com/vulnerability-directory/cve-2024-6485 |
ssvc | Track | https://www.herodevs.com/vulnerability-directory/cve-2024-6485 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.15324 |
EPSS Score | 0.0005 |
Published At | June 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:10:56.635037+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-vxmc-5x29-h64v/GHSA-vxmc-5x29-h64v.json | 36.1.3 |