bootstrap 4.0.0

5 security vulnerabilities found in version 4.0.0

Bootstrap Cross-Site Scripting (XSS) vulnerability

medium severity CVE-2024-6531
medium severity CVE-2024-6531
Patched versions: > 4.6.2
Unaffected versions: < 4.0.0

A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.

XSS vulnerability in bootstrap

medium severity CVE-2019-8331
medium severity CVE-2019-8331
Patched versions: >= 4.3.1

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

Bootstrap Cross-site Scripting vulnerability

medium severity CVE-2018-14042
medium severity CVE-2018-14042
Patched versions: >= 4.1.2

In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.

Bootstrap vulnerable to Cross-Site Scripting (XSS)

medium severity CVE-2018-14041
medium severity CVE-2018-14041
Patched versions: >= 4.1.2

In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.

XSS vulnerabilities via data-parent, data-target, data-container in bootstrap

medium severity CVE-2018-14040
medium severity CVE-2018-14040
Patched versions: >= 4.1.2

In Bootstrap before 4.1.2, XSS is possible in collapse data-parent attribute (CVE-2018-14040), data-target property of scrollspy (CVE-2018-14041), data-container property of tooltip (CVE-2018-14042)

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.