You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2024-6485 (Medium) detected in bootstrap-3.4.1.tgz
CVE-2024-6485 (Medium) detected in bootstrap-3.4.1.tgz - autoclosed
Mar 12, 2025
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2024-6485 (Medium) detected in bootstrap-3.4.1.tgz - autoclosed
CVE-2024-6485 (Medium) detected in bootstrap-3.4.1.tgz
Apr 28, 2025
Uh oh!
There was an error while loading. Please reload this page.
CVE-2024-6485 - Medium Severity Vulnerability
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://registry.npmjs.org/bootstrap/-/bootstrap-3.4.1.tgz
Path to dependency file: /vendor/cache/manageiq-ui-classic-4dce1e6af35a/package.json
Path to vulnerable library: /vendor/cache/manageiq-ui-classic-4dce1e6af35a/package.json
Dependency Hierarchy:
Found in HEAD commit: 99489caead4b82daad011bd2d1b5f720b8428654
Found in base branch: master
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
Publish Date: 2024-07-11
URL: CVE-2024-6485
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: