Security Advisories (3)
CVE-2018-14041 (2018-07-13)

In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy.

CVE-2018-14042 (2018-07-13)

In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.

CVE-2018-14040 (2018-07-13)

Prototype Pollution is a vulnerability affecting JavaScript. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. JavaScript allows all Object attributes to be altered, including their magical attributes such as _proto_, constructor and prototype. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. Properties on the Object.prototype are then inherited by all the JavaScript objects through the prototype chain. When that happens, this leads to either denial of service by triggering JavaScript exceptions, or it tampers with the application source code to force the code path that the attacker injects, thereby leading to remote code execution.

NAME

www_useperl_server_server.pl - Catalyst Test Server

SYNOPSIS

www_useperl_server_server.pl [options]

  -d --debug           force debug mode
  -f --fork            handle each request in a new process
                       (defaults to false)
  -? --help            display this help and exits
  -h --host            host (defaults to all)
  -p --port            port (defaults to 3000)
  -k --keepalive       enable keep-alive connections
  -r --restart         restart when files get modified
                       (defaults to false)
  -rd --restart_delay  delay between file checks
                       (ignored if you have Linux::Inotify2 installed)
  -rr --restart_regex  regex match files that trigger
                       a restart when modified
                       (defaults to '\.yml$|\.yaml$|\.conf|\.pm$')
  --restart_directory  the directory to search for
                       modified files, can be set multiple times
                       (defaults to '[SCRIPT_DIR]/..')
  --follow_symlinks    follow symlinks in search directories
                       (defaults to false. this is a no-op on Win32)
  --background         run the process in the background
  --pidfile            specify filename for pid file

See also:
  perldoc Catalyst::Manual
  perldoc Catalyst::Manual::Intro

DESCRIPTION

Run a Catalyst Testserver for this application.

AUTHORS

Catalyst Contributors, see Catalyst.pm

COPYRIGHT

This library is free software. You can redistribute it and/or modify it under the same terms as Perl itself.