Skip to content

Commit 8799dba

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@446f848
1 parent 99b44b9 commit 8799dba

6 files changed

+142
-0
lines changed

advisories/_posts/2016-07-27-CVE-2016-10735.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ categories:
77
advisory:
88
gem: bootstrap
99
cve: 2016-10735
10+
ghsa: 4p24-vmcr-4gqj
1011
url: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
1112
title: XSS vulnerability via data-target in bootstrap
1213
date: 2016-07-27
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2018-20676 (bootstrap): XSS vulnerability that affects bootstrap'
4+
comments: false
5+
categories:
6+
- bootstrap
7+
advisory:
8+
gem: bootstrap
9+
cve: 2018-20676
10+
ghsa: 3mgp-fx93-9xv5
11+
url: https://github.com/advisories/GHSA-3mgp-fx93-9xv5
12+
title: XSS vulnerability that affects bootstrap
13+
date: 2019-01-17
14+
description: |
15+
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport
16+
attribute.
17+
cvss_v2: 4.3
18+
cvss_v3: 6.1
19+
patched_versions:
20+
- ">= 3.4.0"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2018-20676
24+
- https://github.com/twbs/bootstrap/issues/27044
25+
- https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
26+
- https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
27+
- https://github.com/twbs/bootstrap/pull/27047
28+
- https://access.redhat.com/errata/RHBA-2019:1076
29+
- https://access.redhat.com/errata/RHBA-2019:1570
30+
- https://access.redhat.com/errata/RHSA-2019:1456
31+
- https://access.redhat.com/errata/RHSA-2019:3023
32+
- https://access.redhat.com/errata/RHSA-2020:0132
33+
- https://access.redhat.com/errata/RHSA-2020:0133
34+
- https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@
35+
- https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d
36+
- https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
37+
- https://github.com/advisories/GHSA-3mgp-fx93-9xv5
38+
---
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2018-20677 (bootstrap): bootstrap Cross-site Scripting vulnerability'
4+
comments: false
5+
categories:
6+
- bootstrap
7+
advisory:
8+
gem: bootstrap
9+
cve: 2018-20677
10+
ghsa: ph58-4vrj-w6hr
11+
url: https://github.com/advisories/GHSA-ph58-4vrj-w6hr
12+
title: bootstrap Cross-site Scripting vulnerability
13+
date: 2019-01-17
14+
description: |
15+
In Bootstrap before 3.4.0, XSS is possible in the affix
16+
configuration target property.
17+
cvss_v2: 4.3
18+
cvss_v3: 6.1
19+
patched_versions:
20+
- ">= 3.4.0"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2018-20677
24+
- https://github.com/twbs/bootstrap/issues/27045
25+
- https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
26+
- https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
27+
- https://github.com/twbs/bootstrap/pull/27047
28+
- https://access.redhat.com/errata/RHBA-2019:1076
29+
- https://access.redhat.com/errata/RHBA-2019:1570
30+
- https://access.redhat.com/errata/RHSA-2019:1456
31+
- https://access.redhat.com/errata/RHSA-2019:3023
32+
- https://access.redhat.com/errata/RHSA-2020:0132
33+
- https://access.redhat.com/errata/RHSA-2020:0133
34+
- https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@
35+
- https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@
36+
- https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d
37+
- https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
38+
- https://github.com/advisories/GHSA-ph58-4vrj-w6hr
39+
---
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-6484 (bootstrap): Bootstrap Cross-Site Scripting (XSS) vulnerability'
4+
comments: false
5+
categories:
6+
- bootstrap
7+
advisory:
8+
gem: bootstrap
9+
cve: 2024-6484
10+
ghsa: 9mvj-f7w8-pvh2
11+
url: https://github.com/advisories/GHSA-9mvj-f7w8-pvh2
12+
title: Bootstrap Cross-Site Scripting (XSS) vulnerability
13+
date: 2024-07-11
14+
description: |
15+
A vulnerability has been identified in Bootstrap that exposes users
16+
to Cross-Site Scripting (XSS) attacks. The issue is present in the
17+
carousel component, where the data-slide and data-slide-to attributes
18+
can be exploited through the href attribute of an <a> tag due to
19+
inadequate sanitization. This vulnerability could potentially enable
20+
attackers to execute arbitrary JavaScript within the victim's browser.
21+
cvss_v3: 6.4
22+
unaffected_versions:
23+
- "< 2.0.0"
24+
patched_versions:
25+
- "> 3.4.1"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2024-6484
29+
- https://www.herodevs.com/vulnerability-directory/cve-2024-6484
30+
- https://github.com/advisories/GHSA-9mvj-f7w8-pvh2
31+
---
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-6531 (bootstrap): Bootstrap Cross-Site Scripting (XSS) vulnerability'
4+
comments: false
5+
categories:
6+
- bootstrap
7+
advisory:
8+
gem: bootstrap
9+
cve: 2024-6531
10+
ghsa: vc8w-jr9v-vj7f
11+
url: https://github.com/advisories/GHSA-vc8w-jr9v-vj7f
12+
title: Bootstrap Cross-Site Scripting (XSS) vulnerability
13+
date: 2024-07-11
14+
description: |
15+
A vulnerability has been identified in Bootstrap that exposes users
16+
to Cross-Site Scripting (XSS) attacks. The issue is present in the
17+
carousel component, where the data-slide and data-slide-to attributes
18+
can be exploited through the href attribute of an <a> tag due to
19+
inadequate sanitization. This vulnerability could potentially enable
20+
attackers to execute arbitrary JavaScript within the victim's browser.
21+
cvss_v3: 6.4
22+
unaffected_versions:
23+
- "< 4.0.0"
24+
patched_versions:
25+
- "> 4.6.2"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2024-6531
29+
- https://www.herodevs.com/vulnerability-directory/cve-2024-6531
30+
- https://github.com/advisories/GHSA-vc8w-jr9v-vj7f
31+
---

advisories/_posts/2024-08-01-CVE-2024-41123.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ categories:
77
advisory:
88
gem: rexml
99
cve: 2024-41123
10+
ghsa: r55c-59qm-vjw6
1011
url: https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123
1112
title: DoS vulnerabilities in REXML
1213
date: 2024-08-01
@@ -33,6 +34,7 @@ advisory:
3334
## History
3435
3536
Originally published at 2024-08-01 03:00:00 (UTC)
37+
cvss_v3: 5.3
3638
patched_versions:
3739
- ">= 3.3.3"
3840
related:

0 commit comments

Comments
 (0)