Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-20677
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.132
EPSS Ranking
93.8%
CVSS Severity
CVSS v3 Score
6.1
CVSS v2 Score
4.3
References
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/
https://github.com/twbs/bootstrap/issues/27045
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
https://github.com/twbs/bootstrap/pull/27047
https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://www.tenable.com/security/tns-2021-14
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/
https://github.com/twbs/bootstrap/issues/27045
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
https://github.com/twbs/bootstrap/pull/27047
https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://www.tenable.com/security/tns-2021-14
Products affected by CVE-2018-20677
Getbootstrap
»
Bootstrap
»
Version:
1.0.0
cpe:2.3:a:getbootstrap:bootstrap:1.0.0
Getbootstrap
»
Bootstrap
»
Version:
1.1.0
cpe:2.3:a:getbootstrap:bootstrap:1.1.0
Getbootstrap
»
Bootstrap
»
Version:
1.1.1
cpe:2.3:a:getbootstrap:bootstrap:1.1.1
Getbootstrap
»
Bootstrap
»
Version:
1.2.0
cpe:2.3:a:getbootstrap:bootstrap:1.2.0
Getbootstrap
»
Bootstrap
»
Version:
1.3.0
cpe:2.3:a:getbootstrap:bootstrap:1.3.0
Getbootstrap
»
Bootstrap
»
Version:
1.4.0
cpe:2.3:a:getbootstrap:bootstrap:1.4.0
Getbootstrap
»
Bootstrap
»
Version:
2.0.0
cpe:2.3:a:getbootstrap:bootstrap:2.0.0
Getbootstrap
»
Bootstrap
»
Version:
2.0.1
cpe:2.3:a:getbootstrap:bootstrap:2.0.1
Getbootstrap
»
Bootstrap
»
Version:
2.0.2
cpe:2.3:a:getbootstrap:bootstrap:2.0.2
Getbootstrap
»
Bootstrap
»
Version:
2.0.3
cpe:2.3:a:getbootstrap:bootstrap:2.0.3
Getbootstrap
»
Bootstrap
»
Version:
2.0.4
cpe:2.3:a:getbootstrap:bootstrap:2.0.4
Getbootstrap
»
Bootstrap
»
Version:
2.1.0
cpe:2.3:a:getbootstrap:bootstrap:2.1.0
Getbootstrap
»
Bootstrap
»
Version:
2.1.1
cpe:2.3:a:getbootstrap:bootstrap:2.1.1
Getbootstrap
»
Bootstrap
»
Version:
2.2.0
cpe:2.3:a:getbootstrap:bootstrap:2.2.0
Getbootstrap
»
Bootstrap
»
Version:
2.2.1
cpe:2.3:a:getbootstrap:bootstrap:2.2.1
Getbootstrap
»
Bootstrap
»
Version:
2.2.2
cpe:2.3:a:getbootstrap:bootstrap:2.2.2
Getbootstrap
»
Bootstrap
»
Version:
2.3.0
cpe:2.3:a:getbootstrap:bootstrap:2.3.0
Getbootstrap
»
Bootstrap
»
Version:
2.3.1
cpe:2.3:a:getbootstrap:bootstrap:2.3.1
Getbootstrap
»
Bootstrap
»
Version:
2.3.2
cpe:2.3:a:getbootstrap:bootstrap:2.3.2
Getbootstrap
»
Bootstrap
»
Version:
3.0.0
cpe:2.3:a:getbootstrap:bootstrap:3.0.0
Getbootstrap
»
Bootstrap
»
Version:
3.0.1
cpe:2.3:a:getbootstrap:bootstrap:3.0.1
Getbootstrap
»
Bootstrap
»
Version:
3.0.2
cpe:2.3:a:getbootstrap:bootstrap:3.0.2
Getbootstrap
»
Bootstrap
»
Version:
3.0.3
cpe:2.3:a:getbootstrap:bootstrap:3.0.3
Getbootstrap
»
Bootstrap
»
Version:
3.1.0
cpe:2.3:a:getbootstrap:bootstrap:3.1.0
Getbootstrap
»
Bootstrap
»
Version:
3.1.1
cpe:2.3:a:getbootstrap:bootstrap:3.1.1
Getbootstrap
»
Bootstrap
»
Version:
3.1.11
cpe:2.3:a:getbootstrap:bootstrap:3.1.11
Getbootstrap
»
Bootstrap
»
Version:
3.2.0
cpe:2.3:a:getbootstrap:bootstrap:3.2.0
Getbootstrap
»
Bootstrap
»
Version:
3.3.0
cpe:2.3:a:getbootstrap:bootstrap:3.3.0
Getbootstrap
»
Bootstrap
»
Version:
3.3.1
cpe:2.3:a:getbootstrap:bootstrap:3.3.1
Getbootstrap
»
Bootstrap
»
Version:
3.3.2
cpe:2.3:a:getbootstrap:bootstrap:3.3.2
Getbootstrap
»
Bootstrap
»
Version:
3.3.4
cpe:2.3:a:getbootstrap:bootstrap:3.3.4
Getbootstrap
»
Bootstrap
»
Version:
3.3.5
cpe:2.3:a:getbootstrap:bootstrap:3.3.5
Getbootstrap
»
Bootstrap
»
Version:
3.3.6
cpe:2.3:a:getbootstrap:bootstrap:3.3.6
Getbootstrap
»
Bootstrap
»
Version:
3.3.7
cpe:2.3:a:getbootstrap:bootstrap:3.3.7
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved