You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
bootstrap-tagsinput through 0.8.0 are vulnerable to cross-site scripting when user input is passed into the itemTitle parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter.
mend-for-github-combot
changed the title
bootstrap-tagsinput-0.7.1.tgz: 2 vulnerabilities (highest severity is: 7.3)
bootstrap-tagsinput-0.7.1.tgz: 2 vulnerabilities (highest severity is: 7.3) unreachable
Oct 15, 2024
Vulnerable Library - bootstrap-tagsinput-0.7.1.tgz
jQuery plugin providing a Twitter Bootstrap user interface for managing tags.
Library home page: https://registry.npmjs.org/bootstrap-tagsinput/-/bootstrap-tagsinput-0.7.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/bootstrap-tagsinput/package.json
Vulnerabilities
Unreachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2016-0041
Vulnerable Library - bootstrap-tagsinput-0.7.1.tgz
jQuery plugin providing a Twitter Bootstrap user interface for managing tags.
Library home page: https://registry.npmjs.org/bootstrap-tagsinput/-/bootstrap-tagsinput-0.7.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/bootstrap-tagsinput/package.json
Dependency Hierarchy:
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
In rendr-handlebarsthere are double-escaped data attributes in client side view placeholder that cause a potential XSS attack
Publish Date: 2016-03-11
URL: WS-2016-0041
CVSS 3 Score Details (7.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/WS-2016-0041
Release Date: 2016-03-11
Fix Resolution: org.webjars.bower:bootstrap-tagsinput - 0.8.0;Shared.Plugins - 1.0.6;ClientApp.Web - 2.0.0.1
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2016-1000227
Vulnerable Library - bootstrap-tagsinput-0.7.1.tgz
jQuery plugin providing a Twitter Bootstrap user interface for managing tags.
Library home page: https://registry.npmjs.org/bootstrap-tagsinput/-/bootstrap-tagsinput-0.7.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/bootstrap-tagsinput/package.json
Dependency Hierarchy:
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
bootstrap-tagsinput through 0.8.0 are vulnerable to cross-site scripting when user input is passed into the itemTitle parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter.
Publish Date: 2024-11-03
URL: CVE-2016-1000227
CVSS 3 Score Details (7.3)
Base Score Metrics:
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: